Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2017.1908 HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS) 2 August 2017 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: HP Comware 7, IMC and VCX products Publisher: Hewlett-Packard Operating System: Network Appliance Impact/Access: Denial of Service -- Remote/Unauthenticated Resolution: Patch/Upgrade CVE Names: CVE-2016-2177 Reference: ASB-2017.0005 ASB-2017.0001 ESB-2016.2239.2 ESB-2016.2238 ESB-2016.2116 Original Bulletin: https://h20564.www2.hpe.com/hpsc/doc/public/display?docId=emr_na-hpesbhf03763en_us - --------------------------BEGIN INCLUDED TEXT-------------------- SUPPORT COMMUNICATION - SECURITY BULLETIN Document ID: hpesbhf03763en_us Version: 1 HPESBHF03763 rev.1 - HPE Comware 7, IMC, VCX products using OpenSSL, Remote Denial of Service (DoS) NOTICE: The information in this Security Bulletin should be acted upon as soon as possible. Release Date: 2017-08-02 Last Updated: 2017-08-02 Potential Security Impact: Remote: Denial of Service (DoS) Source: Hewlett Packard Enterprise, HPE Product Security Response Team VULNERABILITY SUMMARY A potential security vulnerability has been identified in Comware 7, IMC, VCX products using OpenSSL. The vulnerability could be remotely exploited to allow a denial of service. References: CVE-2016-2177 - OpenSSL SUPPORTED SOFTWARE VERSIONS*: ONLY impacted versions are listed. Comware v7 (CW7) Products See resolution section for impacted versions HP Intelligent Management Center (iMC) See resolution section for impacted versions VCX Products 9.8.19 BACKGROUND CVSS Version 3.0 and Version 2.0 Base Metrics Reference V3 Vector V3 Base Score V2 Vector V2 Base Score CVE-2016-2177 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L 7.3 (AV:N/AC:L/Au:N/C:P/I:P/A:P) 7.5 Information on CVSS is documented in HPE Customer Notice: HPSN-2008-002 RESOLUTION HPE has provided the following software updates to resolve the vulnerability in Comware 7, IMC PLAT, and VCX. Note: The following products are impacted by this issue COMWARE 7 Products 12500 (Comware 7) - Version: R7377P02 HPE Branded Products Impacted JC072B HP 12500 Main Processing Unit JC085A HP A12518 Switch Chassis JC086A HP A12508 Switch Chassis JC652A HP 12508 DC Switch Chassis JC653A HP 12518 DC Switch Chassis JC654A HP 12504 AC Switch Chassis JC655A HP 12504 DC Switch Chassis JF430A HP A12518 Switch Chassis JF430B HP 12518 Switch Chassis JF430C HP 12518 AC Switch Chassis JF431A HP A12508 Switch Chassis JF431B HP 12508 Switch Chassis JF431C HP 12508 AC Switch Chassis JG497A HP 12500 MPU w/Comware V7 OS JG782A HP FF 12508E AC Switch Chassis JG783A HP FF 12508E DC Switch Chassis JG784A HP FF 12518E AC Switch Chassis JG785A HP FF 12518E DC Switch Chassis JG802A HP FF 12500E MPU 10500 (Comware 7) - Version: R7184 HPE Branded Products Impacted JC611A HP 10508-V Switch Chassis JC612A HP 10508 Switch Chassis JC613A HP 10504 Switch Chassis JC748A HP 10512 Switch Chassis JG608A HP FlexFabric 11908-V Switch Chassis JG609A HP FlexFabric 11900 Main Processing Unit JG820A HP 10504 TAA Switch Chassis JG821A HP 10508 TAA Switch Chassis JG822A HP 10508-V TAA Switch Chassis JG823A HP 10512 TAA Switch Chassis JG496A HP 10500 Type A MPU w/Comware v7 OS JH198A HP 10500 Type D Main Processing Unit with Comware v7 Operating System JH206A HP 10500 Type D TAA-compliant with Comware v7 Operating System Main Processing Unit 5900/5920 (Comware 7) - Version: R2432 HPE Branded Products Impacted JC772A HP 5900AF-48XG-4QSFP+ Switch JG296A HP 5920AF-24XG Switch JG336A HP 5900AF-48XGT-4QSFP+ Switch JG510A HP 5900AF-48G-4XG-2QSFP+ Switch JG554A HP 5900AF-48XG-4QSFP+ TAA Switch JG555A HP 5920AF-24XG TAA Switch JG838A HP FF 5900CP-48XG-4QSFP+ Switch JH036A HP FlexFabric 5900CP 48XG 4QSFP+ TAA-Compliant JH037A HP 5900AF 48XGT 4QSFP+ TAA-Compliant Switch JH038A HP 5900AF 48G 4XG 2QSFP+ TAA-Compliant MSR1000 (Comware 7) - Version: R0306P80 HPE Branded Products Impacted JG875A HP MSR1002-4 AC Router JH060A HP MSR1003-8S AC Router MSR2000 (Comware 7) - Version: R0306P80 HPE Branded Products Impacted JG411A HP MSR2003 AC Router JG734A HP MSR2004-24 AC Router JG735A HP MSR2004-48 Router JG866A HP MSR2003 TAA-compliant AC Router MSR3000 (Comware 7) - Version: R0306P80 HPE Branded Products Impacted JG404A HP MSR3064 Router JG405A HP MSR3044 Router JG406A HP MSR3024 AC Router JG407A HP MSR3024 DC Router JG408A HP MSR3024 PoE Router JG409A HP MSR3012 AC Router JG410A HP MSR3012 DC Router JG861A HP MSR3024 TAA-compliant AC Router MSR4000 (Comware 7) - Version: R0306P80 HPE Branded Products Impacted JG402A HP MSR4080 Router Chassis JG403A HP MSR4060 Router Chassis JG412A HP MSR4000 MPU-100 Main Processing Unit JG869A HP MSR4000 TAA-compliant MPU-100 Main Processing Unit VSR (Comware 7) - Version: E0324 HPE Branded Products Impacted JG810AAE HP VSR1001 Virtual Services Router 60 Day Evaluation Software JG811AAE HP VSR1001 Comware 7 Virtual Services Router JG812AAE HP VSR1004 Comware 7 Virtual Services Router JG813AAE HP VSR1008 Comware 7 Virtual Services Router 7900 (Comware 7) - Version: R2152 HPE Branded Products Impacted JG682A HP FlexFabric 7904 Switch Chassis JG841A HP FlexFabric 7910 Switch Chassis JG842A HP FlexFabric 7910 7.2Tbps Fabric / Main Processing Unit JH001A HP FlexFabric 7910 2.4Tbps Fabric / Main Processing Unit JH122A HP FlexFabric 7904 TAA-compliant Switch Chassis JH123A HP FlexFabric 7910 TAA-compliant Switch Chassis JH124A HP FlexFabric 7910 7.2Tbps TAA-compliant Fabric/Main Processing Unit JH125A HP FlexFabric 7910 2.4Tbps TAA-compliant Fabric/Main Processing Unit 5130EI (Comware 7) - Version: R3115P05 HPE Branded Products Impacted JG932A HP 5130-24G-4SFP+ EI Switch JG933A HP 5130-24G-SFP-4SFP+ EI Switch JG934A HP 5130-48G-4SFP+ EI Switch JG936A HP 5130-24G-PoE+-4SFP+ (370W) EI Switch JG937A HP 5130-48G-PoE+-4SFP+ (370W) EI Switch JG938A HP 5130-24G-2SFP+-2XGT EI Switch JG939A HP 5130-48G-2SFP+-2XGT EI Switch JG940A HP 5130-24G-PoE+-2SFP+-2XGT (370W) EI Switch JG941A HP 5130-48G-PoE+-2SFP+-2XGT (370W) EI Switch JG975A HP 5130-24G-4SFP+ EI Brazil Switch JG976A HP 5130-48G-4SFP+ EI Brazil Switch JG977A HP 5130-24G-PoE+-4SFP+ (370W) EI Brazil Switch JG978A HP 5130-48G-PoE+-4SFP+ (370W) EI Brazil Switch 6125XLG - Version: R2432 HPE Branded Products Impacted 711307-B21 HP 6125XLG Blade Switch 737230-B21 HP 6125XLG Blade Switch with TAA 6127XLG - Version: R2432 HPE Branded Products Impacted 787635-B21 HP 6127XLG Blade Switch Opt Kit 787635-B22 HP 6127XLG Blade Switch with TAA Moonshot - Version: R2432 HPE Branded Products Impacted 786617-B21 - HP Moonshot-45Gc Switch Module 704654-B21 - HP Moonshot-45XGc Switch Module 786619-B21 - HP Moonshot-180XGc Switch Module 5700 (Comware 7) - Version: R2432 HPE Branded Products Impacted JG894A HP FlexFabric 5700-48G-4XG-2QSFP+ Switch JG895A HP FlexFabric 5700-48G-4XG-2QSFP+ TAA-compliant Switch JG896A HP FlexFabric 5700-40XG-2QSFP+ Switch JG897A HP FlexFabric 5700-40XG-2QSFP+ TAA-compliant Switch JG898A HP FlexFabric 5700-32XGT-8XG-2QSFP+ Switch JG899A HP FlexFabric 5700-32XGT-8XG-2QSFP+ TAA-compliant Switch 5930 (Comware 7) - Version: R2432 HPE Branded Products Impacted JG726A HP FlexFabric 5930 32QSFP+ Switch JG727A HP FlexFabric 5930 32QSFP+ TAA-compliant Switch JH178A HP FlexFabric 5930 2QSFP+ 2-slot Switch JH179A HP FlexFabric 5930 4-slot Switch JH187A HP FlexFabric 5930 2QSFP+ 2-slot TAA-compliant Switch JH188A HP FlexFabric 5930 4-slot TAA-compliant Switch 1950 (Comware 7) - Version: R3115P06 HPE Branded Products Impacted JG960A HP 1950-24G-4XG Switch JG961A HP 1950-48G-2SFP+-2XGT Switch JG962A HP 1950-24G-2SFP+-2XGT-PoE+(370W) Switch JG963A HP 1950-48G-2SFP+-2XGT-PoE+(370W) Switch 7500 (Comware 7) - Version: R7184 HPE Branded Products Impacted JD238C HP 7510 Switch Chassis JD239C HP 7506 Switch Chassis JD240C HP 7503 Switch Chassis JD242C HP 7502 Switch Chassis JH207A HP 7500 1.2Tbps Fabric with 2-port 40GbE QSFP+ for IRF-Only Main Processing Unit JH208A HP 7502 Main Processing Unit JH209A HP 7500 2.4Tbps Fabric with 8-port 1/10GbE SFP+ and 2-port 40GbE QSFP+ Main Processing Unit 5510HI (Comware 7) - Version: R1121P01 HPE Branded Products Impacted JH145A HPE 5510 24G 4SFP+ HI 1-slot Switch JH146A HPE 5510 48G 4SFP+ HI 1-slot Switch JH147A HPE 5510 24G PoE+ 4SFP+ HI 1-slot Switch JH148A HPE 5510 48G PoE+ 4SFP+ HI 1-slot Switch JH149A HPE 5510 24G SFP 4SFP+ HI 1-slot Switch 5130HI (Comware 7) - Version: R1121P02 HPE Branded Products Impacted JH323A HPE 5130 24G 4SFP+ 1-slot HI Switch JH324A HPE 5130 48G 4SFP+ 1-slot HI Switch JH325A HPE 5130 24G PoE+ 4SFP+ 1-slot HI Switch JH326A HPE 5130 48G PoE+ 4SFP+ 1-slot HI Switch 5940 (Comware 7) - Version: R2509P02 HPE Branded Products Impacted JH390A HPE FlexFabric 5940 48SFP+ 6QSFP28 Switch JH391A HPE FlexFabric 5940 48XGT 6QSFP28 Switch JH394A HPE FlexFabric 5940 48XGT 6QSFP+ Switch JH395A HPE FlexFabric 5940 48SFP+ 6QSFP+ Switch JH396A HPE FlexFabric 5940 32QSFP+ Switch JH397A HPE FlexFabric 5940 2-slot Switch JH398A HPE FlexFabric 5940 4-slot Switch 5950 (Comware 7) - Version: R6123 HPE Branded Products Impacted JH321A HPE FlexFabric 5950 32QSFP28 Switch JH402A HPE FlexFabric 5950 48SFP28 8QSFP28 Switch JH404A HPE FlexFabric 5950 4-slot Switch 12900E (Comware 7) - Version: R2609 HPE Branded Products Impacted JG619A HP FlexFabric 12910 Switch AC Chassis JG621A HP FlexFabric 12910 Main Processing Unit JG632A HP FlexFabric 12916 Switch AC Chassis JG634A HP FlexFabric 12916 Main Processing Unit JH104A HP FlexFabric 12900E Main Processing Unit JH114A HP FlexFabric 12910 TAA-compliant Main Processing Unit JH263A HP FlexFabric 12904E Main Processing Unit JH255A HP FlexFabric 12908E Switch Chassis JH262A HP FlexFabric 12904E Switch Chassis JH113A HP FlexFabric 12910 TAA-compliant Switch AC Chassis JH103A HP FlexFabric 12916E Switch Chassis iNode PC 7.2 (E0410) - Version: 7.2 E0410 HPE Branded Products Impacted JD144A HP A-IMC User Access Management Software Module with 200-user License JD147A HP IMC Endpoint Admission Defense Software Module with 200-user License JD435A HP A-IMC Endpoint Admission Defense Client Software JF388A HP IMC User Authentication Management Software Module with 200-user License JF388AAE HP IMC User Authentication Management Software Module with 200-user E-LTU JF391A HP IMC Endpoint Admission Defense Software Module with 200-user License JF391AAE HP IMC Endpoint Admission Defense Software Module with 200-user E-LTU JG752AAE HP IMC User Access Manager Software Module with 50-user E-LTU JG754AAE) HP IMC Endpoint Admission Defense Software Module with 50-user E-LTU iMC UAM_TAM 7.2-E0409 - Version: 7.2 E0409 HPE Branded Products Impacted JF388A HP IMC UAM S/W MODULE W/200-USER LICENSE JF388AAE HP IMC UAM S/W MODULE W/200-USER E-LTU JG752AAE HP IMC UAM SW MOD W/ 50-USER E-LTU JG483A HP IMC TAM S/W MODULE W/100-NODE LIC JG483AAE HP IMC TAM S/W MODULE W/100-NODE E-LTU JG764AAE HP IMC TAM SW MOD W/ 50-NODE E-LTU VCX - Version: 9.8.19 HPE Branded Products Impacted J9672A HP VCX V7205 Platform w/ DL360 G7 Srvr J9668A HP VCX IPC V7005 Pltfrm w/ DL120 G6 Srvr JC517A HP VCX V7205 Platform w/DL 360 G6 Server JE355A HP VCX V6000 Branch Platform 9.0 JC516A HP VCX V7005 Platform w/DL 120 G6 Server JC518A HP VCX Connect 200 Primry 120 G6 Server J9669A HP VCX IPC V7310 Pltfrm w/ DL360 G7 Srvr JE341A HP VCX Connect 100 Secondary JE252A HP VCX Connect Primary MIM Module JE253A HP VCX Connect Secondary MIM Module JE254A HP VCX Branch MIM Module JE355A HP VCX V6000 Branch Platform 9.0 JD028A HP MS30-40 RTR w/VCX + T1/FXO/FXS/Mod JD023A HP MSR30-40 Router with VCX MIM Module JD024A HP MSR30-16 RTR w/VCX Ent Br Com MIM JD025A HP MSR30-16 RTR w/VCX + 4FXO/2FXS Mod JD026A HP MSR30-16 RTR w/VCX + 8FXO/4FXS Mod JD027A HP MSR30-16 RTR w/VCX + 8BRI/4FXS Mod JD029A HP MSR30-16 RTR w/VCX + E1/4BRI/4FXS JE340A HP VCX Connect 100 Pri Server 9.0 JE342A HP VCX Connect 100 Sec Server 9.0 Note: Please contact HPE Technical Support if any assistance is needed acquiring the software updates. HISTORY Version:1 (rev.1) - 1 August 2017 Initial release Third Party Security Patches: Third party security patches that are to be installed on systems running Hewlett Packard Enterprise (HPE) software products should be applied in accordance with the customer's patch management policy. Support: For issues about implementing the recommendations of this Security Bulletin, contact normal HPE Services support channel. For other issues about the content of this Security Bulletin, send e-mail to security-alert@hpe.com. Report: To report a potential security vulnerability for any HPE supported product: Web Form: https://www.hpe.com/info/report-security-vulnerability Email: security-alert@hpe.com Subscribe: To initiate a subscription to receive future HPE Security Bulletin alerts via Email: http://www.hpe.com/support/Subscriber_Choice Security Bulletin Archive: A list of recently released Security Bulletins is available here: http://www.hpe.com/support/Security_Bulletin_Archive Software Product Category: The Software Product Category is represented in the title by the two characters following HPSB. 3C = 3COM 3P = 3rd Party Software GN = HP General Software HF = HP Hardware and Firmware MU = Multi-Platform Software NS = NonStop Servers OV = OpenVMS PV = ProCurve ST = Storage Software UX = HP-UX System management and security procedures must be reviewed frequently to maintain system integrity. HPE is continually reviewing and enhancing the security features of software products to provide customers with current secure solutions. "HPE is broadly distributing this Security Bulletin in order to bring to the attention of users of the affected HPE products the important security information contained in this Bulletin. HPE recommends that all users determine the applicability of this information to their individual situations and take appropriate action. HPE does not warrant that this information is necessarily accurate or complete for all user situations and, consequently, HPE will not be responsible for any damages resulting from user's use or disregard of the information provided in this Bulletin. To the extent permitted by law, HPE disclaims all warranties, either express or implied, including the warranties of merchantability and fitness for a particular purpose, title and non-infringement." (C)Copyright 2017 Hewlett Packard Enterprise Company, L.P. Hewlett Packard Enterprise Company shall not be liable for technical or editorial errors or omissions contained herein. The information provided is provided "as is" without warranty of any kind. To the extent permitted by law, neither HPE nor its affiliates, subcontractors or suppliers will be liable for incidental, special or consequential damages including downtime cost; lost profits; damages relating to the procurement of substitute products or services; or damages for loss of data, or software restoration. The information in this document is subject to change without notice. Hewlett Packard Enterprise Company and the names of Hewlett Packard Enterprise Company products referenced herein are trademarks of Hewlett Packard Enterprise Company in the United States and other countries. Other product and company names mentioned herein may be trademarks of their respective owners. - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iQIVAwUBWYFjHox+lLeg9Ub1AQhbUA/+M/vK0Lvnwu9Ldm2Xsy74Ohebp2HmssZv BYymFnktFR1qJ/kXU5gXjuycHU03Glctk8U/72XNxfvC+U8KnKYaY48ORfhKQWXf 2gruxIjg0a2SpVq+Xru4Z/F4/+tMlXndS+qyve7tR2tb8IdxLPpuMzgYqMmutv4p GUXegeCy0Anl/EUgWSJNU+Vd34wXvYXpZQNy2cgcegdXPt/Yzk9tkcRiweRCf8b9 Izc3aRQYNdlk6ZuCkXWq54h/HdsE5oWDUKDA27OMdl+q8rLB5NlC+r6TG3rb95FP e07unujdwQXcUA2ra6aCTO+4e7HxS3kyWJwduDnk7Ua4APERNqCgCuwz0xkZWtCk LLgZ1u6B37dE7G8uoaIssh1Hk2ECyVBmgAnIFf9EyXxVPvqCEyjN+YeJJT+jgy8D MTrnqrQYyDl8mi/pJB98e9YNDAeFUBS622RIgq6Y2OgPWq22S/Et6Yk3mnJ0PXXT HfO91r0TSUvluOzKrzB5kJ3obD/2GP1I7UzEiyvy/Z7sGr+AbkDV0hTM58UNf5xO 3rq3YOxfwCx8r+jSbnIiSSDOnIdPUq4tyGRE70fqV2zvq3QVhOpZb32V1tRrMT78 ucwLWcGWGu1OanFvMonkNgirGOEsTiWr8ZpT70xx4iZcyOrzzk/NJcY90Zg29JGZ S537eP7Y3AU= =hTOn -----END PGP SIGNATURE-----