-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2014.0502
         Security Bulletin: IBM XIV Vulnerability to CVE-2014-0160
                           (OpenSSL heartbleed)
                               15 April 2014

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           IBM XIV Storage System
Publisher:         IBM
Operating System:  Network Appliance
Impact/Access:     Access Privileged Data -- Remote/Unauthenticated
Resolution:        Mitigation
CVE Names:         CVE-2014-0160  

Reference:         ASB-2014.0042
                   ESB-2014.0457

Original Bulletin: 
   http://www-01.ibm.com/support/docview.wss?uid=ssg1S1004577

Comment: No fix is currently available. BM XIV will release a new microcode 
         version including a fix for this vulnerability by May 16th, 2014.
         
         IBM recommends applying mitigation strategies until a fix is made
         available.

- --------------------------BEGIN INCLUDED TEXT--------------------

Security Bulletin: IBM XIV Vulnerability to CVE-2014-0160 (OpenSSL heartbleed)

Document information

More support for:
2810 - XIV Storage System

Version:
Not Applicable

Operating system(s):
N/A

Software edition:
N/A

Reference #:
S1004577

Modified date:
2014-04-13

Security Bulletin

Summary

The OpenSSL heartbleed vulnerability impact is limited to the management and 
CIMON interfaces of XIV systems running microcode versions 11.3.0, 11.3.0.a, 
11.3.1 11.4.1 and 11.4.1.a.

Vulnerability Details

XIV management and CIMOM uses SSL to provide confidentiality and integrity of 
management communications. This vulnerability means that an attacker can 
potentially compromise management communication, gaining access to user 
credentials and thereby to unauthorized management access of an exposed 
system.

Since storage management is usually on an internal and separate network, 
exposure to this vulnerability is limited to users with access to the 
management network.

The impact is limited to management communication only, as XIV does not use 
SSL encryption in the data path.

Affected Products and Versions

XIV Gen3 systems running microcode versions 11.4.1 or 11.4.1.a are vulnerable 
via management and CIMOM ports. Versions 11.3.0, 11.3.0.a and 11.3.1 are 
vulnerable only via the CIMOM port. 
XIV Gen3 systems running older microcode versions are not affected.
XIV Gen2 systems are not affected.

Remediation/Fixes

IBM XIV will release a new microcode version including a fix for this 
vulnerability by May 16th, 2014. After upgrading a vulnerable machine, the 
machine's SSL certificates and corresponding keys should be replaced. If XIV 
users are managed internally (i.e., LDAP authentication is not used), then 
the passwords of these should be changed as well (after the certificates have 
been replaced). Customers who do not manage their own digital certificates 
should contact IBM support for replacement certificates.

Workarounds and Mitigations

The best mitigation is to implement best network security practices on the 
XIV management network. If an attacker cannot access this network, he cannot 
exploit the vulnerability

References

Complete CVSS Guide 
On-line Calculator V2

https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-0160 
https://www.openssl.org/news/secadv_20140407.txt 
http://heartbleed.com/ 

Related information

IBM Secure Engineering Web Portal 
IBM Product Security Incident Response Blog

*The CVSS Environment Score is customer environment specific and will 
ultimately impact the Overall CVSS Score. Customers can evaluate the impact of 
this vulnerability in their environments by accessing the links in the 
Reference section of this Security Bulletin.

Disclaimer

According to the Forum of Incident Response and Security Teams (FIRST), the 
Common Vulnerability Scoring System (CVSS) is an "industry open standard 
designed to convey vulnerability severity and help to determine urgency and 
priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY 
OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS 
FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT 
OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        http://www.auscert.org.au/render.html?cid=1980

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967
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=KDfw
-----END PGP SIGNATURE-----