We are reaching out to each of our customers as part of the CA Technologies Customer Care program?to let you know of important announcements to the product and other related areas.
US-CERT/NIST has issued CVE-2014-3566?against SSL 3.0. CA Technologies recommends disabling the use of SSL 3.0 and earlier in any and all applicable API Management products--including but not limited to the CA API Gateway, CA API Enterprise Service Manager, and the CA API Developer Portal.
The vulnerability has been codenamed?Padding Oracle on Downgraded Legacy Encryption (POODLE). This vulnerability leverages deficiencies in the design of the SSL 3.0 protocol to allow for a man-in-the-middle attack under certain circumstances. An attacker on a compromised server can force a client application to downgrade from TLS 1.0 or later to SSL 3.0. A client or server application that allows the use of SSL 3.0 may be vulnerable to this behavior. Execution of a successful attack using this vulnerability has the following requirements:
The CA API Enterprise Service Manager allows for the use of SSL 3.0 by default. CA Technologies is working on permanently disabling or disallowing the use of SSL 3.0 in CA ESM but a configuration change can be made to force Transport Layer Security version 1.0 (TLS 1.0) by executing the following process:
The CA API Developer Portal uses Apache httpd and Apache Tomcat for serving documents to consumers. These applications can be configured in such a manner to expose them to the POODLE vulnerability. By default, these applications are configured to use SSL 3.0 if it is preferred by the client application--thus making them exposed to exploitation using the aforementioned vulnerability. The vendor for these applications has released the following articles for remediating this behavior on their respective applications:
The CA API Gateway has an internal component that is exposed to this vulnerability. The Process Controller is responsible for managing communications between external tools (such as remote node management or the Enterprise Service Manager). This component currently permits SSL 3.0 when communicating with external tools. The Process Controller can be configured to disallow SSL 3.0 by executing the following procedure:
Red Hat Labs has provided a testing suite as a central repository of tools for testing against this named vulnerability. It can be found at the following URL:?https://access.redhat.com/labs/poodle/. This URL requires an account with Red Hat to access.
A script has been provided by Red Hat to use for testing against Red Hat and Linux-based systems that are equipped with the OpenSSL suite of tools. This script is freely available for all to distribute and use and has been attached to this article as poodle.sh. Download the script to a Linux workstation or server and set it as executable. To use this script, execute the script from the command line with a IP address or hostname as well as an applicable port number. The script will default to IP address 127.0.0.1 and port 443 if no options are provided. For example, do the following to enable the script and scan remote hosts:
Attachments: