book
Article ID: KB0107932
calendar_today
Updated On:
Description
CVE-2023-48795 was published on December 18, 2023 regarding an SSH vulnerability when certain hash algorithms and ciphers are used with the SSH protocol with a variety of SSH clients and servers.
TIBCO Engineering has evaluated this CVE, and has determined that this vulnerability can be mitigated with the BusinessConnect 7.4.0 SSH client with the resolution shown below. Note that only BusinessConnect 7.4 is impacted; the SSH client in versions of BusinessConnect prior to 7.4 do not support the ciphers and hash algorithms mentioned.
The mitigation for the BusinessConnect SSH Server plugin 1.1.0 is shown below, and will only work with this version. Previous versions of this plugin are retired.
Resolution
For BusinessConnect 7.4, add this property to the deployed BC engine TRA files:
java.property.disable.chacha20-poly1305@openssh.comjava.property.maverick.enableETM=false
For the BusinessConnect SFTP Server Plugin 1.1.0:
Under admin System Setting -> Activated Protocol Plug-ins and Properties, for the SFTP plugin, add the following properties of type String with the values shown underneath them.
Property: disable.hashalgorithm
String value:
hmac-sha2-256-etm@openssh.com,
hmac-sha2-512-etm@openssh.com,
hmac-sha1-etm@openssh.com,
hmac-md5-etm@openssh.comProperty: disable.cipher
String value:
chacha20-poly1305@openssh.comThis will disable the vulnerable cipher and hash algorithm from being used.
Issue/Introduction
BusinessConnect 7.4.0 and BusinessConnect SFTP Server Plugin 1.1.0 are affected by this CVE
Additional Information
https://www.cve.org/CVERecord?id=CVE-2023-48795