Populaire vragen (FAQ's) zoeken
Does the CCS Injection OpenSSL vulnerability (CVE-2014-0224) affect APC products?
Issue:
On 05-JUN-2014, the "CCS Injenction" Vulnerability (CVE-2014-0224) was detected and published by several Cyber Security outlets.
Product Line:
Environment:
Cause:
Reported vulnerability in OpenSSL - CVE-2014-0224
Resolution:
Detailed description of the issue and some FAQ's can be found here and here.
The CCS Injection vulnerability highlights that OpenSSL’s flaw with ChangeCipherSpec processing make it possible for malicious third parties to intermediate specific communication by a Man-In-The-Middle attack. The attack can only be performed between a vulnerable client *and* server.
Schneider Electrics' Data Center Business has conducted a vulnerability assessment on the following platforms and found current shipping versions of each are not affected by the aforementioned vulnerabilities.
Cyber Security is an important element of Schneider Electrics' commitment to software quality. Regular vulnerability assessment and further investigation is ongoing on other Schneider Electric platforms in addition to the above and will be detailed if discovered.
On 05-JUN-2014, the "CCS Injenction" Vulnerability (CVE-2014-0224) was detected and published by several Cyber Security outlets.
Product Line:
- StruxureWare Data Center Expert
- StruxureWare Data Center Operation
- NetBotz
- APC Network Management Cards
- PowerChute Network Shutdown
- PowerChute Business Edition
- APC Remote Monitoring Service (RMS)
Environment:
- SSL authentication applications
Cause:
Reported vulnerability in OpenSSL - CVE-2014-0224
Resolution:
Detailed description of the issue and some FAQ's can be found here and here.
The CCS Injection vulnerability highlights that OpenSSL’s flaw with ChangeCipherSpec processing make it possible for malicious third parties to intermediate specific communication by a Man-In-The-Middle attack. The attack can only be performed between a vulnerable client *and* server.
Schneider Electrics' Data Center Business has conducted a vulnerability assessment on the following platforms and found current shipping versions of each are not affected by the aforementioned vulnerabilities.
- Data Center Operations (DCO) is currently operating with OpenSSL v0.9.8 and is therefore not affected.
- Data Center Expert (DCE) version 7.2.5 is currently operating with OpenSSL v1.0.1e and is not affected. Linux associated versions of openSSL and vulnerable versions can be found here: https://access.redhat.com/articles/904433
- NetBotz Appliances 4.4.2 is now running Openssl 0.9.8zc. This issue was fixed in OpenSSL 0.9.8za according to www.openssl.org/news/vulnerabilities.html
- All Network Management Card (NMC) Applications do not utilize OpenSSL and are therefore not affected.
- PowerChute Network Shutdown is not affected. PowerChute Network Shutdown versions 3.1 and 4.0 Appliance for VMware utilizes v0.9.8e. To update SSL on the Appliance run the command yum update openssl
- PowerChute Business Edition is not affected. PowerChute Business Edition utilizes OpenSSL version 0.9.4.
- APC Remote Monitoring Service (RMS) is not affected because it does not utilize OpenSSL.
Cyber Security is an important element of Schneider Electrics' commitment to software quality. Regular vulnerability assessment and further investigation is ongoing on other Schneider Electric platforms in addition to the above and will be detailed if discovered.
Gepubliceerd voor:Schneider Electric Belgium
Ontdek meer
Categorie:
Ontdek meer
Categorie: