SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM BNT Uplink Ethernet Switch Modules for IBM BladeCenter.
SSLv3 contains a vulnerability that has been referred to as the Padding Oracle On Downgraded Legacy Encryption (POODLE) attack. SSLv3 is enabled in IBM BNT Uplink Ethernet Switch Modules for IBM BladeCenter.
Vulnerability Details:
CVE-ID: CVE-2014-3566
Description: IBM BNT Uplink Ethernet Switch Modules for IBM BladeCenter could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.
CVSS Base Score: 4.3
CVSS Temporal Score: See <http://xforce.iss.net/xforce/xfdb/97013> for current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)
None
IBM recommends that you disable SSLv3 from any internet browsers that you use with the IBM BNT Uplink Ethernet Switch Modules for IBM BladeCenter. For instructions on how to disable SSLv3 on any browsers, please refer to its product documentation from the browser vendor. Here are the instructions for certain browsers:
Internet Explorer: https://technet.microsoft.com/en-us/library/security/3009008.aspx
FireFox: <http://kb.mozillazine.org/Security.tls.version.*>
Chrome: http://googleonlinesecurity.blogspot.com.au/2014/10/this-poodle-bites-exploiting-ssl-30.html
You should verify disabling SSLv3 on your browser will not cause any compatibility issues.
IBM recommends that you review your entire environment to identify areas that enable the SSLv3 protocol and take appropriate mitigation and remediation actions. The most immediate mitigation action that can be taken is disabling SSLv3. Again, you should verify disabling SSLv3 does not cause any compatibility issues.
Related Information:
IBM Secure Engineering Web Portal
IBM Product Security Incident Response Blog
Acknowledgement
None
Change History
22 April 2015: Original Copy Published
Disclaimer
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an “industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response.” IBM PROVIDES THE CVSS SCORES “AS IS” WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.