Reset Search
 

 

Article

VN 2015 004 Vulnerability Notice Bar Mitzvah

« Go Back

Vulnerability Notice

 
Vulnerability Summary
Summary
The RC4 algorithm, as used in the TLS protocol and SSL protocol, does not properly combine state data with key data during the initialization phase, which makes it easier for remote attackers to conduct plaintext-recovery attacks against the initial bytes of a stream by sniffing network traffic that occasionally relies on keys affected by the Invariance Weakness, and then using a brute-force approach involving LSB values, aka the "Bar Mitzvah" issue. 

Background (From CVE Project)
CVE-2015-2808
Published: March 31, 2015
CVSS Severity: 4.3

Impact
TLS and SSL protocols using RC4 are more susceptible to a brute-force MITM attack
Products Potentially Affected
The following is the vulnerability status of the software products supported by Extreme Networks for this issue:
 
ExtremeXOS (all products)Fixed
A, B, C, D, G, I and 800 Series Fixed SwitchesYes (See Impact Details: A, B, C, D, G, I and 800 Series Fixed Switches)
ExtremeWare  Yes (See Impact Details: ExtremeWare)
IDS/IPS  Fixed
IdentiFi WirelessFixed
NAC Fixed
NetsightFixed
PurviewFixed
Ridgeline No
Router N,K,SSA,and S Modular Switches No
Security Information & Event ManagerInvestigating 
Summit WM3000 Series  Yes (See Impact Details: Summit WM3000 Series)
X-Series Secure Core Router   Investigating
XSR (X-Pedition Security Router) Investigating
 
 
Impact Details

ExtremeXOS (all products)
  • Vulnerable: Yes  - Fixed
  • Vulnerable Component: HTTPS.  RC4 ciphers are supported.
  • Describe conditions when component Vulnerability occurs (why/when/how): CVE-2015-2808
  • Product version(s) affected:  All EXOS versions.
  • Workaround: NA
  • Fixed In: EXOS 16.2.1, and 21.1.1
A, B, C, D, G, I and 800 Series Fixed Switches
  • Vulnerable: Yes
  • Vulnerable Component: HTTPS. RC4 Ciphers are supported
  • Describe conditions when component Vulnerability occurs(why/when/how): CVE-2015-2808 ​​
  • Note: SSL is only used for Web management is disabled by default.
  • Product version(s) affected: ALL
  • Workaround: Do not enable web management.
  • Target Fix Release: N/A
  • Target Month for Fix Release: N/A
ExtremeWare
  • Vulnerable: Yes 
  • Vulnerable Component: HTTPS.  RC4 ciphers are supported.
  • Describe conditions when component Vulnerability occurs (why/when/how): CVE-2015-2808
  • Product version(s) affected:  Extremeware 7.8
  • Workaround: Disable HTTPS
  • Target Fix Release: There is no active release and will not be fixed
  • Target Month for Fix Release: NA
IDS/IPS
  • Vulnerable: Yes  - Fixed
  • Vulnerable Component:  Web Server
  • Describe conditions when component Vulnerability occurs (Why/When/How): 
  • 1 in 16 Million RC4 ciphers are weak. A malicious user can find the weak key and target the first 100 bytes of a protected data stream. If the attacker uses a MITM attack the user can then determine the victims identity.
  • Product versions Affected: 4.x, 5.x, 6.x both 32bit and 64bit appliances
  • Workaround:  Disable RC4 ciphers in /opt/dragon/enterprise-manager/server/default/deploy/jboss-web.deployer/server.xml
maxThreads="100" strategy="ms" maxHttpHeaderSize="8192"
. . .
ciphers="
SSL_RSA_WITH_RC4_128_MD5, SSL_RSA_WITH_RC4_128_SHA,
TLS_RSA_WITH_AES_128_CBC_SHA, TLS_DHE_RSA_WITH_AES_128_CBC_SHA,
TLS_DHE_DSS_WITH_AES_128_CBC_SHA,
SSL_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_RSA_WITH_3DES_EDE_CBC_SHA,
SSL_DHE_DSS_WITH_3DES_EDE_CBC_SHA"
compression="on" compressionMinSize="300"
. . .
  • ​​​Fixed In:  8.3.0.350
IdentiFi Wireless  
The statement applies to the Extreme Networks Wireless (identiFi) controllers:
  • Vulnerable: Yes  - Fixed
  • Vulnerable Component: Apache web server, admin GUI, captive portal GUI
  • Describe conditions when component Vulnerability occurs (why/when/how): NA
  • Product version(s) affected: all previous versions
  • Workaround: NA
  • Fixed In: v9.21.01   (RC4 was removed from the list of available encryption algorithms when weak encryption algorithms are disabled)
The following statement applies to the Extreme Networks Wireless 26xx series APs:
  • Vulnerable: Yes (used for WEP-secured access only)
  • Vulnerable Component: NA
  • Describe conditions when component Vulnerability occurs (why/when/how): NA
  • Product version(s) affected: None
  • Workaround: Disable WEP as the privacy option for VNS. WEP is considered to be totally insecure and should not be used. WPA2 with AES is the preferred encryption method for wireless access.
  • Target Fix Release: does not require a software change. Customer should have disabled WEP already given its issues which have been public for many years.
  • Target Month for Fix Release:  None. Does not require a software change.
The following statement applies to the Extreme Networks Wireless 36xx, 37xx and 38xx series APs: 
  • Vulnerable:Yes (used for WEP-secured access only)
  • Vulnerable Component: NA
  • Describe conditions when component Vulnerability occurs (why/when/how): NA
  • Product version(s) affected: All supported versions
  • Workaround: Disable WEP as the privacy option for each VNS. WEP is considered to be totally insecure and should not be used. WPA2 with AES is the preferred encryption method for wireless access.
  • Target Fix Release: does not require a software change. Customer should have disabled WEP already given its issues which have been public for many years.
  • Target Month for Fix Release:  None. Does not require a software change.
NAC
  • Vulnerable: Yes  - Fixed
  • Vulnerable Component:  Web Server   RADIUS - EAP-TLS/PEAP/TTLS
  • Describe conditions when component Vulnerability occurs(Why/When/How):  1 in 16 Million RC4 ciphers are weak. A malicious user can find the weak key and target the first 100 bytes of a protected data stream. If the attacker uses a MITM attack the user can then determine the victims identity.
  • Product Versions Affected:  4.x, 5.x, 6.x both 32bit and 64bit appliances
  • Workaround:  No
  • Fixed In:  7.0.3.11

NetSight
  • Vulnerable: Yes  - Fixed
  • Vulnerable Component: Web Server
  • Describe conditions when component Vulnerability occurs (Why/When/How):  1 in 16 Million RC4 ciphers are weak. A malicious user can find the weak key and target the first 100 bytes of a protected data stream. If the attacker uses a MITM attack the user can then determine the victims identity.
  • Product versions Affected:  4.x, 5.x, 6.x both 32bit and 64bit appliances
  • Workaround:  Disable RC4 ciphers in /appdata/NSJBoss.properties 
enterasys.tomcat.ciphers=SSL_RSA_WITH_RC4_128_MD5,SSL_RSA_WITH_RC4_128_SHA,TLS_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_RSA_WITH_AES_128_CBC_SHA,TLS_DHE_DSS_WITH_AES_128_CBC_SHA
  • Fixed In:  7.0.3.11
Purview
  • Vulnerable: Yes  - Fixed
  • Vulnerable Component:  Web Server
  • Describe conditions when component Vulnerability occurs (Why/When/How):  1 in 16 Million RC4 ciphers are weak. A malicious user can find the weak key and target the first 100 bytes of a protected data stream. If the attacker uses a MITM attack the user can then determine the victims identity. 
  • Product versions Affected:  6.x
  • Workaround:  No
  • Fixed In:  7.0.3.11
Ridgeline
  • Vulnerable: No
Router N, K, SSA, and S Modular Switches
  • Vulnerable: No  
  • Does not use SSL
Security Information & Event Manager
  • Vulnerable: TBD
Summit WM3000 Series
  • Vulnerable: Yes
  • Vulnerable Component: SSH, HTTPS, and Captive Portal
  • Describe conditions when component Vulnerability occurs: See CVE-2015-2808
  • Product version(s) affected: Versions prior to v5.5.5
  • Workaround: N/A
  • Target Fix Release: 5.5.5
  • Target Month for Fix Release: Fix is available in an existing release
X-Series Secure Core Router
  • Vulnerable: TBD
XSR (X-Pedition Security Router)
  • Vulnerable: TBD
Repair Recommendations
The resolution to any threat or issue is dependent upon a number of things, including the setup of the computer network and how the local IT team wants to address the situation. Accordingly, in addition to updating the software as recommended in this document, the local IT team will need to analyze and address the situation in a manner that it determines will best address the set-up of its computer network. 
Update the software, identified in this Notice, in your Extreme Networks products by replacing it with the latest releases from Extreme Networks including those listed above. 
Firmware and software can be downloaded from www.extremenetworks.com/support


Additional Information: 
https://www.blackhat.com/docs/asia-15/materials/asia-15-Mantin-Bar-Mitzvah-Attack-Breaking-SSL-With-13-Year-Old-RC4-Weakness-wp.pdf
Legal Notice
This advisory notice is provided on an “as is” basis and Extreme Networks makes no representations or warranties of any kind, expressly disclaiming the warranties of merchantability or fitness for a particular use. Use of the information provided herein or materials linked from this advisory notice is at your own risk. Extreme Networks reserves the right to change or update this document at any time, and expects to update this document as new information becomes available. The information provided herein is applicable to current Extreme Networks products identified herein and is not intended to be any representation of future functionality or compatibility with any third-party technologies referenced herein. This notice shall not change any contract or agreement that you have entered into with Extreme Networks. 

Revision History

Rev. No.Date ModifiedDescription / Milestone
1.014-Apr-15First release
2.028-May-15Update IDS, NAC, Netsight and A, B, C, D, G, I, and 800 Series Fixed Switches
3.018-Jun-15Update Target Fix Release and Target Month For Release for NetSight and Purview
4.012-Aug-15Update Target Fix Release and Target Month to N/A for A, B, C, D, G, I and 800 Series Fixed Switches
   

This notice was imported into GTAC Knowledge on 13-Jan-2016.  

Feedback

 

Was this article helpful?


   

Feedback

Please tell us how we can make this article more useful.

Characters Remaining: 255