Security Bulletin: Padding Oracle Protection in IBM DataPower Gateways GatewayScript modules (CVE-2015-7412)
IBM DataPower Gateways has addressed a Padding Oracle Protection vulnerability in GatewayScript decryption.
DESCRIPTION: IBM DataPower Gateways GatewayScript modules may be vulnerable to Padding Oracle attacks in some scenarios, which could allow an attacker to decrypt the captured message, and other messages encrypted using the same cryptographic keys.
CVSS Base Score: 3.7
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/107532 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
Affected Products and Versions
IBM DataPower Gateway appliances version 18.104.22.168
Fix is available in versions 22.214.171.124. Refer to APAR IT10701 for URLs to download the fix.
You should verify applying this fix does not cause any compatibility issues.
Workarounds and Mitigations
This vulnerability exists only in IBM DataPower Gateways functions configured with a JWE decrypt action, or using the GatewayScript decryption API.
Requiring the ciphertext to be signed by the sender, and verifying that signature as a prerequisite to performing decryption will address the vulnerability.
Get Notified about Future Security Bulletins
IBM Product Security Incident Response Blog
October 29th, 2015: Original Version Published
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.