Viola Systems TD-14-3-1_SSLv3_vulnerability.pdf Oct-16-2014 15:30 EET Version history: TD-14-3-1 released Oct-16-2014: Document released SSLv3 “Poodle” (CVE-2014-3566) security vulnerability information Introduction There is a recently found security vulnerability called ”Poodle”. This document explains the vulnerability and its effect to Viola Systems’ products and provides instructions on how to secure the system and to mitigate the risks. General The Poodle (Padding Oracle On Downgraded Legacy Encryption) attack targets vulnerabilities in SSLv3 implementation. The aim is to get access to e.g. HTTP cookies and authorization headers, in order to break the SSL 3.0 encryption. This requires that the attacker is able to modify the transmissions between SSL client and server (man-in-the-middle attack) by either getting privileged access to a network or with e.g. a fake Wi-Fi hot spot. Viola Systems’ products We have tested our products against the “Poodle” vulnerability and found that the following devices are affected to the vulnerability. Viola Systems’ product line Viola M2M Gateways Viola “2G” and “2.5G” Arctics Viola “3G” and “LTE” Arctics Viola AMR server Viola Arctic AMR Affected to “Poodle” vulnerability Yes No Yes Yes No Detailed information The details of the vulnerability have been explained in the U.S. government’s vulnerability database NIST under the number CVE-2014-3566. The NIST page lists the OpenSSL document as one of detailed external sources for information (https://www.openssl.org/~bodo/ssl-poodle.pdf). The document in OpenSSL link explains the “Poodle” attack in details and lists further references for understanding the issue. Brief instructions for solving the problem Viola M2M Gateway 3.x See the M2M GW’s Web UI top row for version information, if no version information is seen, contact Viola Systems Technical Support, [email protected] for detailed information Follow the instructions below. If having any problem with the procedure, contact Viola Systems Technical Support, [email protected] 1) Log in to the command line of M2M gateway via SSH (you can use e.g. PuTTY as SSH client in Windows) as viola-adm user. Viola Systems TD-14-3-1_SSLv3_vulnerability.pdf Oct-16-2014 15:30 EET 2) Switch to root user with command (remember the dash mark after “su” command): su 3) Enter the following command in one line (you can copy-paste it from here): sed -i.backup 's/^SSLProtocol all -SSLv2$/SSLProtocol all -SSLv2 -SSLv3/' /etc/httpd/conf.d/viola.conf 4) Restart the httpd service: service httpd restart Viola Arctic 3G/LTE Gateways A new firmware will be released soon. This document will be updated with instructions Meanwhile, see the risk mitigation chapter Viola AMR server Contact Viola Systems Technical Support, [email protected] Mitigating risks for web UI targeted attacks Do not expose the web UI to internet. Usually the Web UI (M2M GW’s or Arctic’s) can be reached via VPN tunnel. Verify that the firewall is enabled in Arctics. The latest firmware releases (2.5.6 and above) in 3G/LTE GW Arctics have firewall enabled by default. See the security guideline document for more information: http://files.violasystems.com/appnotes/VA-11-5-1_Viola_M2M_solution_security.pdf Questions/detailed instructions If you have questions regarding the instructions or regarding the vulnerability, please contact Viola Systems’ Technical Support via email: [email protected].
© Copyright 2024 ExpyDoc