Lucene search

K
ibmIBMF36268DA4E2DAE684A3A7ECA453BE573A8EE5CCB554BDE0D4BA5B92CCCF43D43
HistoryJun 18, 2018 - 12:08 a.m.

Security Bulletin: Vulnerability in SSLv3 affects IBM Storwize V7000 Unified (CVE-2014-3566)

2018-06-1800:08:59
www.ibm.com
12

0.975 High

EPSS

Percentile

100.0%

Summary

There are security vulnerabilities in SSLv3 that is shipped with IBM Storwize V7000 Unified.

Vulnerability Details

CVE-ID: CVE-2014-3566

**DESCRIPTION:**Product could allow a remote attacker to obtain sensitive information, caused by a design error when using the SSLv3 protocol. A remote user with the ability to conduct a man-in-the-middle attack could exploit this vulnerability via a POODLE (Padding Oracle On Downgraded Legacy Encryption) attack to decrypt SSL sessions and access the plaintext of encrypted connections.

CVSS Base Score: 4.3
CVSS Temporal Score: See http://xforce.iss.net/xforce/xfdb/97013 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (AV:N/AC:M/Au:N/C:P/I:N/A:N)

Affected Products and Versions

IBM Storwize V7000 Unified, versions 1.3.0.0 to 1.4.3.5 and 1.5.0.0 to 1.5.0.5 use SSLv3 that is affected by this vulnerability

Remediation/Fixes

A fix for these issues is in version 1.5.2.1 of IBM Storwize V7000 Unified. Customers running an affected version of V7000 Unified should upgrade to 1.5.2.1 or a later version, so that the fix gets applied.
_
_Latest Storwize V7000 Unified Software

Workarounds and Mitigations

IBM recommends that you reduce your exposure to these vulnerabilities by taking all of the following actions:

1. Upgrade affected versions of IBM Storwize V7000 Unified to version 1.5.2.1
2. Implement comprehensive IT security practices, such as the use of firewalls, strong authentication, intrusion detection, virus protection, and remote monitoring.
3. Review your entire environment to disable the SSLv3 protocol. The most immediate action that can be taken is disabling SSLv3. Again, you should verify disabling SSLv3 does not cause any compatibility issues.