Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Notifications
Login / Register
Community
Community
Notifications
close
  • Forums
  • Knowledge Center
  • Events & Webinars
  • Ideas
  • Blogs
Help
Help
  • Explore Community
  • Get Started
  • Ask the Community
  • How-To & Best Practices
  • Contact Support
Login / Register
Sustainability
Sustainability

We Value Your Feedback!
Could you please spare a few minutes to share your thoughts on Cloud Connected vs On-Premise Services. Your feedback can help us shape the future of services.
Learn more about the survey or Click here to Launch the survey
Schneider Electric Services Innovation Team!

DCO - Vulnerability using Protocol SSL - TLS

EcoStruxure IT forum

Schneider Electric support forum about installation and configuration for DCIM including EcoStruxure IT Expert, IT Advisor, Data Center Expert, and NetBotz

cancel
Turn on suggestions
Auto-suggest helps you quickly narrow down your search results by suggesting possible matches as you type.
Showing results for 
Show  only  | Search instead for 
Did you mean: 
  • Home
  • Schneider Electric Community
  • EcoStruxure IT
  • EcoStruxure IT forum
  • DCO - Vulnerability using Protocol SSL - TLS
Options
  • Subscribe to RSS Feed
  • Mark Topic as New
  • Mark Topic as Read
  • Float this Topic for Current User
  • Bookmark
  • Subscribe
  • Mute
  • Printer Friendly Page
Invite a Co-worker
Send a co-worker an invite to the portal.Just enter their email address and we'll connect them to register. After joining, they will belong to the same company.
You have entered an invalid email address. Please re-enter the email address.
This co-worker has already been invited to the Exchange portal. Please invite another co-worker.
Please enter email address
Send Invite Cancel
Invitation Sent
Your invitation was sent.Thanks for sharing Exchange with your co-worker.
Send New Invite Close
Top Experts
User Count
Cory_McDonald
Admiral Cory_McDonald Admiral
124
Jef
Admiral Jef Admiral
109
gsterling
Captain gsterling Captain
71
APC_Steve
Captain APC_Steve Captain
62
View All

Invite a Colleague

Found this content useful? Share it with a Colleague!

Invite a Colleague Invite
Back to EcoStruxure IT forum
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

0 Likes
11
1232
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

DCO - Vulnerability using Protocol SSL - TLS

Preview:

-       one of the biggest national banks in our country has the DCO running in an virtual server and the DCE in a physical console

-       Our customer  used a third part utility to detect vulnerabilities. They use “McAfee Vulnerability Manager 7.5”

-       The DCO is running in version 7.5

Vulnerabilities:

The customer is using the McaFee utility require eliminating these 3 vulnerabilities:

-       CVE-2014-3566 (SSL v3 information disclosure vulnerability)

-       CVE-2015-4000 (TLS diffie-Hellman Key exchange logjam vulnerability)

-       CVE-2015-2808 (TLS/SSL RC4 cipher suites information disclosure vulnerability)

Customer requirements:

-       Thecustomer only accepted security protocol “TLS version 1.2” in all the communication protocols. This is mandatory in the client console - Server - webmin - applications.

-       The customer must disable in the application (DCO) “ALL” the previous security protocols (SSL v2 / SSL v3 / TLS 1.0 / TLS 1.1). All of them must be disabled or deleted in the communication protocols between client – webmin – server .

Remarks:

-       The DCO has the setup option to manage the SSL setting. If the customer disables the SSL protocol in the setup option, the DCO is accessible using the http:/ with port 80 and this option is completely prohibited by the IT department.

The customer requires get access to the DCO using web security connection “https:” with port 443, also with the communication protocol TLS 1.2 in both consoles client and server. (it is mandatory!).

Question:

What is the setup in the DCO / Server (console) to get access mandatory with the communication protocol TLS 1.2? This means, the previous protocols (SSL v2 / SSL v3 / TLS 1.0 / TLS 1.1) must be disable in the DCO console and only enable TLS 1.2…

(CID:105457052)

Labels
  • Labels:
  • Data Center Operation
Reply

Link copied. Please paste this link to share this article on your social media post.

  • All forum topics
  • Previous Topic
  • Next Topic
Replies 11
DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

0 Likes
9
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

Limiting the number of open ports and improving security are two of the main goals of DCO 8.0

Until DCO 8.0 is released, you can see a list of ports used by DCO 7.5 at StruxureWare Data Center Operation Network Firewall Port Details.

Known vulnerabilities (and actions) are listed at StruxureWare Data Center Operation Software Vulnerability Scanning Results.

I'm not sure whether or not we support the exact SSL/TLS configuration you want in DCO 7.5 but I will ping someone that can verify it.

Update 2015-12-04 09:05: DCO 7.5 does not support TLS 1.2.

(CID:105457097)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

Hi Martin!!, I have found an APC information (see link: http://www.schneider-electric.us/sites/us/en/support/faq/faq_main.page?page=content&country=US〈=en&i... ) that explains us that after DCO revision 7.4.1 the vulnerability with name "Poodle" - CVE-2014-3566 was fixed with a patch.  Do you know what was the Schneider solution to resolve this vulnerability? If Schneider did not use TLS to resolve the issue, what was the SE solution?...

(CID:105457248)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:01 AM

The package base was updated to include patched versions of the affected components. Additionally, in the default configuration, the server rejects SSLv2 and SSLv3 connections. DCO 7.5 supports TLS 1.0.

(CID:105457290)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:00 AM

Luis Lopez Borbon POODLE exploits a bug in TLS which enabled a man-in-the-middle to downgrade a connection to SSLv3. But it requires the server to support SSLv3. So the POODLE patch for DCO disables SSLv3.

(CID:105457337)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:18 PM . Last Modified: ‎2024-04-09 02:00 AM

If I disable the SSL in the DCO user interface, the DCO is accessible using a not secure communication between server and client, this means: use http and port 80. This is completely unacceptable for my customer. How can I do??? thanks! 

 

(CID:105457371)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

Martin Kamp Jensen If DCO supports TLS 1.0, how can I enable TLS 1.0 in DCO?? I know how and where to disable SSL protocol but I don’t know where can I enable the TLS protocol. My customer requires getting access to the DCO server only using TLS (SSL must be disabled, it is mandatory!)..please help!

(CID:105457372)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

DCO 7.5 supports and uses TLS 1.0 while SSLv2 and SSLv3 are already disabled out-of-the-box. You do not need to perform any steps to secure DCO 7.5 against "Poodle". We are aware of DCO 7.5 requiring too many open ports (e.g. port 80 and other ports between cluster nodes as per the link I provided in the original answer). This will be handled in DCO 8.0. Unfortunately, we do support limiting the open ports in DCO 7.5.

(CID:105457507)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

Hi Martin,

Please assist.

We have this vulnerability error - "openssl multiple ssl_mode_release_buffers Denial of service vulnerabilities" ( SSL/TLS MITM vulnerability (CVE-2014-0224)

We are running DCO v8.0.2 and I am told this version has a built in fix for this specific vulnerability.

From research, this vulnerability only occurs when its enabled, may I disable "openssl multiple ssl_mode_release_buffers?  and if so, what is the impact, also how do I go about this ?

Any help is greatly appreciated!

Kind regards

(CID:122688657)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

Hi juice

I'm curios as to learn how you detect this vulnerability.  What tool are you using?

 

The CVE-2014-0224 vulnerability is fixed in DCO 8.0.2 – you can verify this in several ways – the easiest way is to log into the server and:

Run the command:

rpm -qa openssl

Result:

openssl-1.0.1e-42.el7_1.9.x86_64

 

This lists the version of Openssl we are using.

 

Run the command:

rpm -q --changelog openssl

 

Result (a list of all fixes in this version of openssl)

 

* Tue Jun 23 2015 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-42.9

- fix the CVE-2015-1791 fix (broken server side renegotiation)

* Tue Jun 03 2014 Tomáš Mráz <tmraz@redhat.com> 1.0.1e-34.3

- fix CVE-2010-5298 - possible use of memory after free

- fix CVE-2014-0195 - buffer overflow via invalid DTLS fragment

- fix CVE-2014-0198 - possible NULL pointer dereference

- fix CVE-2014-0221 - DoS from invalid DTLS handshake packet

- fix CVE-2014-0224 - SSL/TLS MITM vulnerability

- fix CVE-2014-3470 - client-side DoS when using anonymous ECDH

 

As you can see this issue is fixed in the version of openSSL we use in DCO 8.0.2

 

Best Regards

    Anders

(CID:122693386)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

In response to DCIM_Support
0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2024-04-09 02:00 AM

Hi Anders

 

Thank you very much for you effort in making me understand - much appreciated.

Our security team uses McAfee Vulnerability Manager which basically identifies possible threats to the network in terms of firewall and intrusions.

I will give it ago and if necessary will consult our local agent.

 

much appreciated.

(CID:123340498)

Reply

Link copied. Please paste this link to share this article on your social media post.

DCIM_Support
Picard DCIM_Support
Picard

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2023-10-31 10:52 PM

0 Likes
0
1230
  • Mark as New
  • Bookmark
  • Subscribe
  • Mute
  • Subscribe to RSS Feed
  • Permalink
  • Print
  • Email to a Friend
  • Report Inappropriate Content

Link copied. Please paste this link to share this article on your social media post.

Posted: ‎2020-07-02 06:19 PM . Last Modified: ‎2023-10-31 10:52 PM

superhero.png

This question is closed for comments. You're welcome to start a new topic if you have further comments on this issue.

Reply

Link copied. Please paste this link to share this article on your social media post.

To The Top!

Forums

  • APC UPS Data Center Backup Solutions
  • EcoStruxure IT
  • EcoStruxure Geo SCADA Expert
  • Metering & Power Quality
  • Schneider Electric Wiser

Knowledge Center

Events & webinars

Ideas

Blogs

Get Started

  • Ask the Community
  • Community Guidelines
  • Community User Guide
  • How-To & Best Practice
  • Experts Leaderboard
  • Contact Support
Brand-Logo
Subscribing is a smart move!
You can subscribe to this board after you log in or create your free account.
Forum-Icon

Create your free account or log in to subscribe to the board - and gain access to more than 10,000+ support articles along with insights from experts and peers.

Register today for FREE

Register Now

Already have an account? Login

Terms & Conditions Privacy Notice Change your Cookie Settings © 2025 Schneider Electric

This is a heading

With achievable small steps, users progress and continually feel satisfaction in task accomplishment.

Usetiful Onboarding Checklist remembers the progress of every user, allowing them to take bite-sized journeys and continue where they left.

of