5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
6.6 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.4%
The OpenSSL RSA Decryption timing-based side channel attack affects BMC’s HTTPS and SSH connections.
CVEID:CVE-2022-4304
**DESCRIPTION:**OpenSSL could allow a remote attacker to obtain sensitive information, caused by a timing-based side channel in the RSA Decryption implementation. By sending an overly large number of trial messages for decryption, an attacker could exploit this vulnerability to obtain sensitive information.
CVSS Base score: 5.9
CVSS Temporal Score: See: https://exchange.xforce.ibmcloud.com/vulnerabilities/246612 for the current score.
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Product(s) | Version(s) |
---|---|
OPENBMC | OP910.00 - OP910.70 |
OPENBMC | OP940.00 - OP940.50 |
OPENBMC | FW1020.00 - FW1020.30 |
OPENBMC | FW1030.00 - FW1030.10 |
HMC firmware | OP940.00 - OP940.50 |
Customers with the products below should install OP910.80 or newer to remediate this vulnerability.
Power 9
Customers with the products below should install OP940.60 or newer to remediate this vulnerability.
Power 9
Customers with the products below should install FW1020.40(1020_106) or install FW1030.20(1030_060) or newer to remediate this vulnerability.
Power 10
Customers with the products below should install OP940.60 or newer firmware to remediate this vulnerability.
Power 9
None
5.9 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
HIGH
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
NONE
Availability Impact
NONE
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
6.6 Medium
AI Score
Confidence
High
0.002 Low
EPSS
Percentile
52.4%