Remediation Steps to SOI EEM from POODLE Vulnerability (CVE-2014-3566)
search cancel

Remediation Steps to SOI EEM from POODLE Vulnerability (CVE-2014-3566)

book

Article ID: 409500

calendar_today

Updated On:

Products

CA Service Operations Insight (SOI)

Issue/Introduction

Remediation Steps to SOI EEM from POODLE Vulnerability (CVE-2014-3566)

Medium-risk vulnerability (NVD) associated with SSL (Secure Sockets Layer) version 3. This vulnerability, publicly disclosed on October 14, 2014, is known as the "POODLE" issue (Padding Oracle On Downgraded Legacy Encryption).

Kindly note that this is a general vulnerability and is not specific to any CA product.

Environment

EEM 12.6.4 running on SOI Manager Server

Resolution

To remediate (CVE-2014-3566), upgrade EEM to version 12.6.9.0

if you are unable to upgrade EEM, then disable SSLv3 on the EEM or the SOI manager.

To disable SSLv3, set the protocol to TLSV1 or SSLV23 

  1. On SOI manager update the file eiam.config file located in the CA\SOI\tomcat\webapps\sam of the SOI manager.

    add the following line:

    <TransportConfig>
         <!--possible values are SSLV23 /SSLV3/TLSV1-->
        <secureProtocol>TLSV1</secureProtocol>
    </TransportConfig>

  2. On the EEM server,
    in igateway.conf file under <Connector name="defaultport"> tag,   set the protocol to TLSV1 or SSLV23    

            <secureProtocol>TLSV1</secureProtocol>