23
Thu, Jan
4 New Articles

Should I Care About CVEs on IBM i?

IBM i (OS/400, i5/OS)
Typography
  • Smaller Small Medium Big Bigger
  • Default Helvetica Segoe Georgia Times

The days when we could feel confident that IBM i had no security vulnerabilities are very much over. A peek at the Common Vulnerabilities and Exposures (CVE) registry list proves it.

For security admins on Windows and Linux platforms, the Common Vulnerabilities and Exposures (CVE) registry has been common knowledge for a long time. But to IBM i admins, it may be a little less well known. When I worked in a multi-platform security team, we bragged that there were never any IBM i security vulnerabilities. Windows and Linux were riddled with them, but IBM i? Nope, never. We held our heads high with pride. However, in recent years, a few things have changed in the IBM i CVE landscape. One is that the platform has been getting more attention from folks trying to penetrate the system, whether they be bad actors or penetration testers. Another is that a lot of open-source, third-party software has been introduced to the system, allowing for innovation. This article aims to shed a little light on what CVEs are and how they can be used to your security advantage.

What Is a CVE?

The CVE registry is a list of cybersecurity vulnerabilities that is managed and was developed by the MITRE Corporation in 1999 in response to the need for standardizing how vulnerabilities and exposures are identified as they are discovered and publicly disclosed.

The National Institute of Standards and Technology (NIST) publishes these security vulnerabilities in the U.S. National Vulnerability Database (NVD) and adds additional information, such as a Common Vulnerability Scoring System (CVSS) score that rates the severity of the vulnerability. CVSS scores range from 0-10, with 0 being the most minimal severity and 10 being the maximum. It is generally recommended that any CVE entry with a score that is 7 or higher be addressed as soon as possible and that a regular schedule of applying fixes be maintained for less-critical vulnerabilities. Even though low-score vulnerabilities are not as easy to exploit or not as prevalent, they would not be reported if they could not do damage.

CVSS Score Range

0: Minimal severity

0.1–3.9: Low severity

4.0–6.9: Medium severity

7.0–8.9: High severity

9.0–10.0: Critical severity

NIST also provides the Security Content Automation Protocol (SCAP) and CVE content data feeds, which greatly improve the ability to integrate information from the database into automated processes and provide quicker access to security vulnerability disclosures.

Anatomy of a CVE Entry

For each CVE entry, you will find the following information in the National Vulnerability Database:

  • CVE Identifier: A unique For example, CVE-2023-50314.
  • CVE Description: A brief description of the security vulnerability.
  • CVSS Score: A score ranking the severity of the vulnerability, ranging from 0 to 10.
  • Publishing Authority: This is the CVE Numbering Authority (CNA) that first publicly disclosed the vulnerability. CNAs are major OS vendors, security researchers, or research organizations (for example, IBM, Microsoft, Google, etc.).
  • Affected Product Details: The affected operating system or application is identified in the CVE entry.
  • Remediation: If there is a patch available or any manual remediation steps known to fix the vulnerability, this information will be listed.
  • Pertinent Information: Additional information may be listed if there are websites that have published more documentation or advisories on the issue.

Sample CVE: https://www.cve.org/CVERecord?id=CVE-2023-50314

IBM i and CVEs

Due to the solid architecture of the IBM i operating system, there is quite a noticeable difference in the number of security vulnerabilities on the system versus other operating systems. However, the need to be vigilant remains.

With technology advancements that have opened up IBM i to increased interoperability, such as the PASE environment and all the open-source, third-party applications that can be installed there, as well as the number of web applications connecting to the system, the additional risks inherent to those applications have entered the system as well.

Add that to the vast increase in global cybercriminal activity and the need to protect against it, and you will notice that the IBM i security playing field of 15+ years ago is not nearly the same as it used to be, highlighting the benefit of taking advantage of security vulnerability information for the IBM i platform.

Recently, a wide range of IBM i security vulnerabilities have been reported on a fairly regular basis via the IBM i Security Bulletins.

Examples

Here is an example of a CVE report listed in the National Vulnerability Database and the subsequent security bulletin produced by IBM regarding a vulnerability that can lead to a Denial-of-Service (DOS) attack.

CVE-2024-31879

You can tell from this report that it is a high-severity vulnerability affecting IBM i versions 7.2, 7.3, and 7.4. The PTFs released for 5770-SS1 Option 3 to patch the vulnerability are listed in the bulletin as well.

Here is another example of a CVE report listed in the NVD and IBM’s subsequent security bulletin. It refers to a high severity vulnerability that can allow IBM i privilege escalation due to the ability to configure a physical file trigger on IBM i versions 7.2, 7.3, 7.4. and 7.5. Likewise, the PTFs to resolve the vulnerability are listed.

CVE-2024-27275

OS and Software Fixes and Patches

Also important to note is that keeping up with current OS and software versions is critical to securing your system, since IBM and other vendors do not always release fixes to patch security vulnerabilities on older releases. Security vulnerabilities that are now being discovered and made public may have been existent in the operating system or application for a long time, but unsupported versions of the OS or licensed product are not likely to have fixes created to patch them.

The Need to Keep Up: CVE Monitoring and Remediation

The public disclosure of security vulnerabilities is certainly a sort of double-edged sword in that, as vulnerabilities are publicized with the intention of providing information for us to beef up our security, they are also a playground for cybercriminals to quickly gain information to be used against us as they craft ways to exploit the vulnerabilities. Hackers and cybercriminals actively scan for published vulnerabilities on servers and take advantage of them to gain unauthorized access to sensitive data. Security research data shows that vulnerabilities are exploited within 4-44 days of publication, and some researchers claim that 25% of high-risk vulnerabilities are exploited within 24 hours. Therefore, it is crucial to monitor for CVE entries applicable to your servers on a daily basis. This should include your operating system and any third-party software used on your servers.

To keep up with security-related notifications published by IBM, it is highly recommended you subscribe to receive IBM i Security Bulletins. You can subscribe to these notifications here: https://www.ibm.com/support/pages/node/718119

Keeping up with patches is a constant battle, but is crucial to do so. This fundamental practice cannot be overstated. Unpatched machines are regularly the weak point used to gain unauthorized access to corporate networks in highly publicized cybersecurity breaches, which also points to the fact that maintaining a solid inventory of your IT assets (both hardware and software, including licensed products and third-party applications) is the first step to ensuring your systems are kept up to date. Many times, an old test system is sitting in a lab somewhere and gets forgotten about, but it remains publicly accessible from the internet and is a sitting duck just waiting for a cybercriminal to discover. That old test system could also be an IBM i LPAR sitting on your network, also needing attention.

With the uptick of CVE-related IBM i vulnerabilities, you must keep up to date with patching your system by applying critical fixes. Get into the habit of applying fixes for CVEs with higher CVSS scores as soon as possible and apply fixes for lower-severity CVEs on a regularly scheduled basis.

Fixes related to the OS and IBM i licensed products can be downloaded from Fix Central and applied. 

Fixes related to third-party libraries need to be obtained from the applicable vendors.

The Answer

So, should you care about CVEs on IBM i? Yes! You may never know if your diligence in protecting your systems saved you from a security breach, but you will definitely know if a known CVE was exploited. Keep at it!

BLOG COMMENTS POWERED BY DISQUS

LATEST COMMENTS

Support MC Press Online

$

Book Reviews

Resource Center

  • SB Profound WC 5536 Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application. You can find Part 1 here. In Part 2 of our free Node.js Webinar Series, Brian May teaches you the different tooling options available for writing code, debugging, and using Git for version control. Brian will briefly discuss the different tools available, and demonstrate his preferred setup for Node development on IBM i or any platform. Attend this webinar to learn:

  • SB Profound WP 5539More than ever, there is a demand for IT to deliver innovation. Your IBM i has been an essential part of your business operations for years. However, your organization may struggle to maintain the current system and implement new projects. The thousands of customers we've worked with and surveyed state that expectations regarding the digital footprint and vision of the company are not aligned with the current IT environment.

  • SB HelpSystems ROBOT Generic IBM announced the E1080 servers using the latest Power10 processor in September 2021. The most powerful processor from IBM to date, Power10 is designed to handle the demands of doing business in today’s high-tech atmosphere, including running cloud applications, supporting big data, and managing AI workloads. But what does Power10 mean for your data center? In this recorded webinar, IBMers Dan Sundt and Dylan Boday join IBM Power Champion Tom Huntington for a discussion on why Power10 technology is the right strategic investment if you run IBM i, AIX, or Linux. In this action-packed hour, Tom will share trends from the IBM i and AIX user communities while Dan and Dylan dive into the tech specs for key hardware, including:

  • Magic MarkTRY the one package that solves all your document design and printing challenges on all your platforms. Produce bar code labels, electronic forms, ad hoc reports, and RFID tags – without programming! MarkMagic is the only document design and print solution that combines report writing, WYSIWYG label and forms design, and conditional printing in one integrated product. Make sure your data survives when catastrophe hits. Request your trial now!  Request Now.

  • SB HelpSystems ROBOT GenericForms of ransomware has been around for over 30 years, and with more and more organizations suffering attacks each year, it continues to endure. What has made ransomware such a durable threat and what is the best way to combat it? In order to prevent ransomware, organizations must first understand how it works.

  • SB HelpSystems ROBOT GenericIT security is a top priority for businesses around the world, but most IBM i pros don’t know where to begin—and most cybersecurity experts don’t know IBM i. In this session, Robin Tatam explores the business impact of lax IBM i security, the top vulnerabilities putting IBM i at risk, and the steps you can take to protect your organization. If you’re looking to avoid unexpected downtime or corrupted data, you don’t want to miss this session.

  • SB HelpSystems ROBOT GenericCan you trust all of your users all of the time? A typical end user receives 16 malicious emails each month, but only 17 percent of these phishing campaigns are reported to IT. Once an attack is underway, most organizations won’t discover the breach until six months later. A staggering amount of damage can occur in that time. Despite these risks, 93 percent of organizations are leaving their IBM i systems vulnerable to cybercrime. In this on-demand webinar, IBM i security experts Robin Tatam and Sandi Moore will reveal:

  • FORTRA Disaster protection is vital to every business. Yet, it often consists of patched together procedures that are prone to error. From automatic backups to data encryption to media management, Robot automates the routine (yet often complex) tasks of iSeries backup and recovery, saving you time and money and making the process safer and more reliable. Automate your backups with the Robot Backup and Recovery Solution. Key features include:

  • FORTRAManaging messages on your IBM i can be more than a full-time job if you have to do it manually. Messages need a response and resources must be monitored—often over multiple systems and across platforms. How can you be sure you won’t miss important system events? Automate your message center with the Robot Message Management Solution. Key features include:

  • FORTRAThe thought of printing, distributing, and storing iSeries reports manually may reduce you to tears. Paper and labor costs associated with report generation can spiral out of control. Mountains of paper threaten to swamp your files. Robot automates report bursting, distribution, bundling, and archiving, and offers secure, selective online report viewing. Manage your reports with the Robot Report Management Solution. Key features include:

  • FORTRAFor over 30 years, Robot has been a leader in systems management for IBM i. With batch job creation and scheduling at its core, the Robot Job Scheduling Solution reduces the opportunity for human error and helps you maintain service levels, automating even the biggest, most complex runbooks. Manage your job schedule with the Robot Job Scheduling Solution. Key features include:

  • LANSA Business users want new applications now. Market and regulatory pressures require faster application updates and delivery into production. Your IBM i developers may be approaching retirement, and you see no sure way to fill their positions with experienced developers. In addition, you may be caught between maintaining your existing applications and the uncertainty of moving to something new.

  • LANSAWhen it comes to creating your business applications, there are hundreds of coding platforms and programming languages to choose from. These options range from very complex traditional programming languages to Low-Code platforms where sometimes no traditional coding experience is needed. Download our whitepaper, The Power of Writing Code in a Low-Code Solution, and:

  • LANSASupply Chain is becoming increasingly complex and unpredictable. From raw materials for manufacturing to food supply chains, the journey from source to production to delivery to consumers is marred with inefficiencies, manual processes, shortages, recalls, counterfeits, and scandals. In this webinar, we discuss how:

  • The MC Resource Centers bring you the widest selection of white papers, trial software, and on-demand webcasts for you to choose from. >> Review the list of White Papers, Trial Software or On-Demand Webcast at the MC Press Resource Center. >> Add the items to yru Cart and complet he checkout process and submit

  • Profound Logic Have you been wondering about Node.js? Our free Node.js Webinar Series takes you from total beginner to creating a fully-functional IBM i Node.js business application.

  • SB Profound WC 5536Join us for this hour-long webcast that will explore:

  • Fortra IT managers hoping to find new IBM i talent are discovering that the pool of experienced RPG programmers and operators or administrators with intimate knowledge of the operating system and the applications that run on it is small. This begs the question: How will you manage the platform that supports such a big part of your business? This guide offers strategies and software suggestions to help you plan IT staffing and resources and smooth the transition after your AS/400 talent retires. Read on to learn: