{}

我們的品牌

Impact-Company-Logo-English Black-01-177x54

歡迎造訪施耐德電機全球網站

歡迎訪問我們的網站
搜尋常見問題
Does the CCS Injection OpenSSL vulnerability (CVE-2014-0224) affect APC products?
Issue:
On 05-JUN-2014, the "CCS Injenction" Vulnerability (CVE-2014-0224) was detected and published by several Cyber Security outlets.


Product Line:
  • StruxureWare Data Center Expert
  • StruxureWare Data Center Operation
  • NetBotz
  • APC Network Management Cards
  • PowerChute Network Shutdown
  • PowerChute Business Edition
  • APC Remote Monitoring Service (RMS)

Environment:
  • SSL authentication applications

Cause:
Reported vulnerability in OpenSSL - CVE-2014-0224


Resolution:
Detailed description of the issue and some FAQ's can be found here and here.

The CCS Injection vulnerability highlights that OpenSSL’s flaw with ChangeCipherSpec processing make it possible for malicious third parties to intermediate specific communication by a Man-In-The-Middle attack. The attack can only be performed between a vulnerable client *and* server.

Schneider Electrics' Data Center Business has conducted a vulnerability assessment on the following platforms and found current shipping versions of each are not affected by the aforementioned vulnerabilities.
  • Data Center Operations (DCO) is currently operating with OpenSSL v0.9.8 and is therefore not affected.
  • Data Center Expert (DCE)  version 7.2.5 is currently operating with OpenSSL v1.0.1e and is not affected. Linux associated versions of openSSL and vulnerable versions can be found here:  https://access.redhat.com/articles/904433
  • NetBotz Appliances 4.4.2 is now running Openssl 0.9.8zc. This issue was fixed in OpenSSL 0.9.8za according to  www.openssl.org/news/vulnerabilities.html
  • All Network Management Card (NMC) Applications do not utilize OpenSSL and are therefore not affected.
  • PowerChute Network Shutdown is not affected. PowerChute Network Shutdown versions 3.1 and 4.0 Appliance for VMware utilizes v0.9.8e. To update SSL on the Appliance run the command yum update openssl
  • PowerChute Business Edition is not affected. PowerChute Business Edition utilizes OpenSSL version 0.9.4.
  • APC Remote Monitoring Service (RMS) is not affected because it does not utilize OpenSSL.

Cyber Security is an important element of Schneider Electrics' commitment to software quality. Regular vulnerability assessment and further investigation is ongoing on other Schneider Electric platforms in addition to the above and will be detailed if discovered.

施耐德電機Taiwan

探索更多
類別:
可能有幫助的文章
探索更多
類別: