Overview
The customer reported multiple vulnerabilities on their systems, including the MGR version R04.14.10.01. The recommended solution is to upgrade to RHEL 8.10, which includes necessary security patches. Post-upgrade checks for SSH, Log4j, SSL/TLS, and cipher suite validation are required to ensure system security.
Information
Issue: Multiple vulnerabilities reported on systems running MGR version R04.14.10.01.
Resolution Steps:
-
Upgrade to RHEL 8.10:
- Ensure all components (MGR, AMS, FAF, HUB, LGP, PBC, RTR, etc.) are upgraded to the latest versions available.
- Follow your standard upgrade procedures to install RHEL 8.10.
-
Post-Upgrade Checks:
-
SSH Version and Key Exchange:
- Run
ssh -Vto verify OpenSSH version is 9.6+. - Execute
ssh -Q kex | grep sntrupto ensuresntrup761x25519-sha512@openssh.comis supported.
- Run
-
Log4j Library Check:
- If using the LGR component, run
find / -type f -name "log4j*.jar" -exec ls -lh {} \; 2>/dev/null. - Replace or upgrade any Log4j 1.x files found.
- If using the LGR component, run
-
SSL/TLS Certificate Validation:
- Use
echo | openssl s_client -connect <host>:443 2>/dev/null | openssl x509 -noout -enddateto check certificate expiration. - Ensure certificates are valid and issued by a trusted CA.
- Use
-
TLS Protocol Support:
- Run the following to check supported protocols:
for v in ssl3 tls1 tls1_1 tls1_2 tls1_3; do echo -n "$v: " echo | openssl s_client -connect <host>:443 -$v </dev/null 2>&1 | grep "Protocol" || echo "Not supported" done - Only TLS 1.2 and TLS 1.3 should be enabled.
- Run the following to check supported protocols:
-
Cipher Suite Validation:
- Test with
echo | openssl s_client -connect <host>:443 -cipher 'RC4-SHA' 2>&1 | head -n20. - Ensure connections fail for insecure ciphers.
- Test with
-
SSH Version and Key Exchange:
Note: If compatibility issues arise with the upgrade, consult with management to decide whether to proceed with the upgrade or accept the risk of existing vulnerabilities.
Frequently Asked Questions
- How do I know if my system is affected by these vulnerabilities?
- Check your system's current version and compare it with the latest available versions. If your system is not on RHEL 8.10 or above, it may be vulnerable.
- What are the post-upgrade checks I need to perform?
- After upgrading to RHEL 8.10, perform checks for SSH version, Log4j libraries, SSL/TLS certificates, TLS protocol support, and cipher suite validation as detailed in the resolution steps.
- What if there are compatibility issues with the upgrade?
- Consult with your management to decide whether to proceed with the upgrade or accept the risk of the current vulnerabilities. If you choose not to upgrade, document the decision and monitor for any security advisories.
Priyanka Bhotika
Comments