Power HMC is affected by vulnerabilities in in OpenSSL

Главная Форумы POWER Systems AIX/Hardware Power HMC is affected by vulnerabilities in in OpenSSL

Просмотр 4 веток ответов
  • Автор
    • #20022

      Security Bulletin: Power Hardware Management Console is affected by vulnerabilities in OpenSSL (CVE-2014-0160 and CVE-2014-0076)

      Affected Products and Versions

      HMC V7 Release 7.7.0
      HMC V7 Release 7.8.0


      и до кучи в эту же тему…
      требуется ставить заплаты на сервера с прошивками AL770 AM770 AM780 AH780.


    • #20032

      Тут главное без паники.

      Ну кому в голову придет выставлять HMC и SP в открытую сеть? А в своей то сети вы уж сможете быть в безопасности как мне кажется.

    • #20036

      “trust nobody!”
      Патчи нужно ставить в любом случае.

    • #20048
    • #20053

      Вот грамотный подход к проблеме. В штатах она эскалирована на самый верхний уровень организаций:

      WASHINGTON, April 25 — The U.S. Department of the Treasury’sOffice of the Comptroller of the Currency issued the following bulletin:

      Subject: Information Security Vulnerability in OpenSSL Encryption Tool (Heartbleed)

      Date: April 25, 2014

      To: Chief Executive Officers of All National Banks, Federal Branches and Agencies, Federal Savings Associations, Technology Service Providers, Department and Division Heads, All Examining Personnel, and Other Interested Parties

      Description: Joint Statement


      On April 10, 2014, the members of the Federal Financial Institutions Examination Council (FFIEC)1 issued the attached alert to notify financial institutions of a material security vulnerability in OpenSSL, a widely used encryption tool. The alert outlined the risks associated with this vulnerability (also known as Heartbleed) and the risk mitigation steps that financial institutions are expected to take to address those risks. It also refers institutions to additional resources to help them mitigate the risks.


      Banks should address the vulnerability resulting from OpenSSL by taking the following risk mitigation steps, as appropriate:

      Identify and upgrade vulnerable internal systems and services, follow appropriate patch management practices, and test to ensure a secure configuration.

      Ensure third-party vendors take appropriate risk mitigation steps and then monitor the status of the vendors’ efforts.

      Note for Community Banks

      Community banks should ensure that their in-house information technology unit and their service providers are taking appropriate action to mitigate this risk.

      Further Information

      Since the FFIEC alert, additional information regarding the OpenSSL vulnerability has emerged, indicating that it may affect a range of technologies including, but not limited to, internally and externally facing servers, network devices, printers, applications, and mobile devices. Given the evolving information about the scope and nature of this vulnerability, banks should remain vigilant and continue their ongoing risk assessments and monitoring to detect and prevent against unauthorized access to customer information. The resources listed below are available to financial institutions and provide additional guidance on risk and vulnerability identification, and implementation of appropriate risk mitigation and management practices.

      Questions regarding the FFIEC statement should be directed to the Office of the Comptroller of the Currency’s Bank Information Technology Division at (202) 649-6340. Carolyn G. DuChene


Просмотр 4 веток ответов
  • Для ответа в этой теме необходимо авторизоваться.