First published: Tue Dec 16 2014(Updated: )
IBM WebSphere Process Server 7.0, WebSphere Enterprise Service Bus 7.0, and Business Process Manager Advanced 7.5.x through 7.5.1.2, 8.0.x through 8.0.1.3, and 8.5.x through 8.5.5 disregard the SSL setting in the SCA module HTTP import binding and unconditionally select the SSLv3 protocol, which makes it easier for remote attackers to hijack sessions or obtain sensitive information by leveraging the use of a weak cipher.
Credit: psirt@us.ibm.com
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Business Process Manager | =7.5.0.0 | |
IBM Business Process Manager | =7.5.0.1 | |
IBM Business Process Manager | =7.5.1.0 | |
IBM Business Process Manager | =7.5.1.1 | |
IBM Business Process Manager | =8.0.0.0 | |
IBM Business Process Manager | =8.0.1.0 | |
IBM Business Process Manager | =8.0.1.1 | |
IBM Business Process Manager | =8.0.1.2 | |
IBM Business Process Manager | =8.0.1.3 | |
IBM Business Process Manager | =8.5.0.0 | |
IBM Business Process Manager | =8.5.0.1 | |
IBM Business Process Manager | =8.5.5.0 | |
Ibm Websphere Enterprise Service Bus | =7.0 | |
IBM WebSphere Process Server | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2014-6176 has a high severity rating due to the use of the SSLv3 protocol which is vulnerable to attacks.
To fix CVE-2014-6176, you should configure your server to disable SSLv3 and enforce the use of more secure protocols.
CVE-2014-6176 affects IBM Business Process Manager versions 7.5.x to 8.5.x, as well as IBM WebSphere Process Server 7.0 and WebSphere Enterprise Service Bus 7.0.
CVE-2014-6176 can lead to potential man-in-the-middle attacks due to the vulnerabilities associated with SSLv3.
A possible workaround for CVE-2014-6176 includes setting up additional security measures such as stronger encryption protocols until a patch is finalized.