Security Bulletin: Vulnerability in IBM Client Application Access TLS AES GCM Nonce Generation (CVE-2016-0270)
For very large data sets, IBM Client Application Access using TLS and AES GCM generate a weak nonce.
DESCRIPTION: IBM Domino contains an unspecified vulnerability that could lead to session snooping using man-in-the-middle techniques.
CVSS Base Score: 5.9
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/111050 for the current score
CVSS Environmental Score*: Undefined
CVSS Vector: (CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N)
Affected Products and Versions
IBM Client Application Access 188.8.131.52 and 184.108.40.206 IF 1 are affected.
The IBM Client Application Access AES GCM weak nonce generation vulnerability is tracked as SPR KLYHA6ZP4F and the fix is available in 220.127.116.11 Interim Fix 2.
|IBM Client Application Access||18.104.22.168 Interim Fix 2||http://www-01.ibm.com/support/docview.wss?uid=swg21657963|
Workarounds and Mitigations
IBM recommends that the fix be applied to relevant systems.
Customers can work around this issue by excluding AES GCM from the ciphers used by TLS 1.2. Please see the following link for instructions on configuring TLS 1.2 Ciphers
Get Notified about Future Security Bulletins
This vulnerability was reported to IBM by Hanno Bock ( https://hboeck.de/) and Aaron Zauner (SBA Research).
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Security Bulletin.
According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.