ESB-2017.2637 - [Appliance] HP Trusted Platform Module: Access privileged data - Remote/unauthenticated 2017-10-19

Printable version
PGP/GPG verifiable version

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2017.2637
  HPESBHF03789 rev.2 - Certain HPE Gen9 Systems with HP Trusted Platform
              Module v2.0 Option, Unauthorized Access to Data
                              19 October 2017

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           HP Trusted Platform Module
Publisher:         Hewlett-Packard
Operating System:  Network Appliance
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
Resolution:        Patch/Upgrade
CVE Names:         CVE-2017-15361  

Reference:         ESB-2017.2607

Original Bulletin: 
   https://support.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03789en_us

- --------------------------BEGIN INCLUDED TEXT--------------------

- -----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

Note: the current version of the following document is available here:
https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03789en_us

SUPPORT COMMUNICATION - SECURITY BULLETIN

Document ID: hpesbhf03789en_us
Version: 2

HPESBHF03789 rev.2 - Certain HPE Gen9 Systems with HP Trusted Platform Module
v2.0 Option, Unauthorized Access to Data

NOTICE: The information in this Security Bulletin should be acted upon as
soon as possible.

Release Date: 2017-10-18
Last Updated: 2017-10-17

Potential Security Impact: Local: Unauthorized Access to Data; Remote:
Unauthorized Access to Data

Source: Hewlett Packard Enterprise, Product Security Response Team

VULNERABILITY SUMMARY
A potential security vulnerability has been identified in the "HP Trusted
Platform Module 2.0 Option" kit. This optional kit is available for HPE Gen9
systems with firmware version 5.51. The vulnerability in TPM firmware 5.51 is
that new mathematical methods exist such that RSA keys generated by the TPM
2.0 with firmware 5.51 are cryptographically weakened. This vulnerability
could lead to local and remote unauthorized access to data.

**Note:**  

 * The "HP Trusted Platform Module Option" (TPM 1.2) for HPE Gen6 through
Gen9 systems is not affected.

References:

  - PSRT110605
  - PSRT110598
  - CVE-2017-15361

SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed.

  - HPE Trusted Platform Module 2.0 Kit FW 5.51 - TPM 2.0 FW 5.62 is not
affected.  This is the Gen9 TPM 2.0 option (only Gen9 servers could have this
option). The TPM 2.0 Option for Gen9 servers is not standard on Gen9 servers
- - - it is an option.
  - HP ProLiant BL460c Gen9 Server Blade n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant BL660c Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL120 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL160 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL360 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL380 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL388 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL580 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL60 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant DL80 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant ML110 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HP ProLiant ML150 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE Apollo 4200 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL180 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL180 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL20 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant DL560 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 3.3GHz 4-core 8GB-R 1TB Non-hot Plug
4LFF SATA 300W AP Svr/Promo n/a - only if "HPE Trusted Platform Module 2.0
Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 4GB-R 1TB Non-hot Plug 4LFF SATA 300W
Svr/S-Buy n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version
5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 1TB Non-hot Plug 4LFF SATA 300W
Perf Svr n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version
5.51 is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/GO n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version 5.51
is installed.
  - HPE ProLiant ML10 Gen9 E3-1225 v5 8GB-R 2TB Non-hot Plug 4LFF SATA 300W
Svr/TV n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version 5.51
is installed.
  - HPE ProLiant ML10 Gen9 G4400 4GB-R Non-hot Plug 4LFF SATA 300W Entry Svr
n/a - only if "HPE Trusted Platform Module 2.0 Kit" w/ FW version 5.51 is
installed.
  - HPE ProLiant ML30 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML350 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant ML350 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL170r Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL190r Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL230a Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL230a Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL250a Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL250a Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL260a Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL450 Gen9 Server n/a - only if "HPE Trusted Platform Module
2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL730f Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL730f Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL740f Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL740f Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL750f Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.
  - HPE ProLiant XL750f Gen9 Server n/a - only if "HPE Trusted Platform
Module 2.0 Kit" w/ FW version 5.51 is installed.

BACKGROUND

  CVSS Base Metrics
  =================
  Reference, CVSS V3 Score/Vector, CVSS V2 Score/Vector

    CVE-2017-15361
      7.4 CVSS:3.0/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
      6.2 (AV:L/AC:H/Au:N/C:C/I:C/A:C)

    Information on CVSS is documented in
    HPE Customer Notice HPSN-2008-002 here:

https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-c01345499

RESOLUTION

HPE has provided both an updated system ROM, and updated TPM firmware to
correct this issue for impacted systems. Update the system ROM and "HPE
Trusted Platform Module 2.0 Option" to firmware version 5.62 or subsequent. 

The latest version of the System ROM is available, and must be updated before
updating the TPM firmware. Use these instructions:

1.Click the following link: 

 * <http://www.hpe.com/support/hpesc>

2.Enter a product name (e.g., "DL380 Gen9") in the text field under Enter a
Product Name or Number.  
3.Click Go.  
4.Select the appropriate product model from the Results list (if prompted).  
5.Click the "drivers, software & firmware" hyperlink under the Download
Options tab.  
6.Select the system's specific operating system from the Operating Systems
dropdown menu.  
7.Click the category BIOS - System ROM.  
8.Select the latest release of HPE System ROM Version 2.50 (or later).  
9.Click Download.  


The latest version of the TPM firmware is available. Use these instructions:

 1.Click the following link:

 * <http://www.hpe.com/support/hpesc>

 2.Enter a product name (e.g., "DL380 Gen9") in the text field under Enter a
Product Name or Number.  
 3.Click Go.  
 4.Select the appropriate product model from the Results list (if prompted). 

 5.Click the "drivers, software & firmware" hyperlink under the Download
Options tab.  
 6.Select the system's specific operating system from the Operating Systems
dropdown menu.  
 7.Click the category Firmware.  
 8.Select the latest release of the HPE Trusted Platform Module 2.0 Option
firmware update for HPE Gen9 Severs Version 5.62 (or later).  
 9.Click Download.  

**Note:** 

 * After the firmware upgrade, the TPM will generate RSA keys using an
improved algorithm. Revoking the weak TPM generated RSA keys will still be
required. Refer to the OS documentation for OS-specific instructions. In
addition, a System ROM update to version 2.50 (or later) is required before
updating the TPM 2.0 firmware.
 
 * Please refer to the HPE *Customer Bulletin* as well:
  
   - **HPE ProLiant Gen9 Servers** - Potential Vulnerability in the HPE
Trusted Platform Module 2.0 Option Firmware Version 5.51 for HPE ProLiant
Gen9 Servers
<http://h20565.www2.hpe.com/hpsc/doc/public/display?docId=a00028289en_us>

HISTORY

Version:1 (rev.1) - 16 October 2017 Initial release

Version:2 (rev.2) - 17 October 2017 Added CVE reference


Third Party Security Patches: Third party security patches that are to be
installed on systems running Hewlett Packard Enterprise (HPE) software
products should be applied in accordance with the customer's patch management
policy.

Support: For issues about implementing the recommendations of this Security
Bulletin, contact normal HPE Services support channel. For other issues about
the content of this Security Bulletin, send e-mail to security-alert@hpe.com.

Report: To report a potential security vulnerability for any HPE supported
product:
  Web form: https://www.hpe.com/info/report-security-vulnerability
  Email: security-alert@hpe.com

Subscribe: To initiate a subscription to receive future HPE Security Bulletin
alerts via Email: http://www.hpe.com/support/Subscriber_Choice

Security Bulletin Archive: A list of recently released Security Bulletins is
available here: http://www.hpe.com/support/Security_Bulletin_Archive

Software Product Category: The Software Product Category is represented in
the title by the two characters following HPSB.

3C = 3COM
3P = 3rd Party Software
GN = HPE General Software
HF = HPE Hardware and Firmware
MU = Multi-Platform Software
NS = NonStop Servers
OV = OpenVMS
PV = ProCurve
ST = Storage Software
UX = HP-UX

Copyright 2016 Hewlett Packard Enterprise

Hewlett Packard Enterprise shall not be liable for technical or editorial
errors or omissions contained herein. The information provided is provided
"as is" without warranty of any kind. To the extent permitted by law, neither
HP or its affiliates, subcontractors or suppliers will be liable for
incidental,special or consequential damages including downtime cost; lost
profits; damages relating to the procurement of substitute products or
services; or damages for loss of data, or software restoration. The
information in this document is subject to change without notice. Hewlett
Packard Enterprise and the names of Hewlett Packard Enterprise products
referenced herein are trademarks of Hewlett Packard Enterprise in the United
States and other countries. Other product and company names mentioned herein
may be trademarks of their respective owners.
- -----BEGIN PGP SIGNATURE-----
Version: GnuPG v1

iQEcBAEBCAAGBQJZ5k72AAoJELXhAxt7SZaiU4EIAKJK3i30Qui8Fqm7/Kr5R/oB
UgW8kg/4EkbEpJ7ewQwjE2gaIMUmo6q2we+mpLU3/4T8+ZcZgxw7hDZqOrOn7V08
rzchXK1oLqdW9vu0BlWrUK6TTWHghW38nwqLHhmxuRavrVR4kYB+ctfFUS3vaSVd
eQWBn6coSrkeToazgtvlPilChl1ygH4NITmLBXPnSbcp8U1yLhF+j0eUKLcZnR8l
OMi65CVCNWCcSL3NV6x4NXvREmehKXGqgokGUe6rBWucU+A21W66GhsnhC5ysa4j
SR8Ungf0W1QihfW3+Jijiu5hC7mrcZrGi+AZAvJDb4S5zvfM+hVUZNuEGa6nzVM=
=KoaT
- -----END PGP SIGNATURE-----

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=dSYu
-----END PGP SIGNATURE-----

« Back to bulletins