Endpoint Protection

 View Only
Expand all | Collapse all
  • 1.  OpenSSL

    Posted Apr 10, 2014 11:18 AM

    Does Symantec use OpenSSL in any of their products?



  • 2.  RE: OpenSSL
    Best Answer

    Posted Apr 10, 2014 11:21 AM

    SEPM does, see here:

    https://www-secure.symantec.com/connect/forums/openssl-bug

    https://www-secure.symantec.com/connect/blogs/heartbleed-openssl-take-action-now



  • 3.  RE: OpenSSL

    Posted Apr 10, 2014 11:27 AM

    What is the solution? is there a patch out yet?  We are on SEPM 12.1.4013.4013



  • 4.  RE: OpenSSL

    Posted Apr 10, 2014 11:30 AM

    No patch for SEPM yet. Is it exposed externally? If not, the risk is very limited.



  • 5.  RE: OpenSSL

    Posted Apr 10, 2014 12:04 PM

    SEPM itself is not exposed externally. SEP clients are.



  • 6.  RE: OpenSSL

    Posted Apr 10, 2014 12:18 PM

    SEP clients should not be affected.

    Now if those machines served a different purpose where they acted as webserver than they may be affected.

    SEP alone is not though.



  • 7.  RE: OpenSSL

    Posted Apr 10, 2014 12:49 PM

    Thanks, Brian.

    As an FYI, I Opened a case with Symantec and below is the recommendation:

     

    Customers using an affected version should block general access to port 8445 on their SEPM to mitigate this vulnerability until a product update is available.

     

    To temporarily mitigate the vulnerability before you upgrade the Symantec Endpoint Protection Manager console, you can block the affected port with a firewall rule. However, if you block the port, the management console loses specific functionality. You should review the implications prior to implementation.

     

    Note: The port mentioned below is the Symantec Endpoint Protection Manager default reporting port. If you have changed the reporting port, please alter the firewall rules appropriately.

     

    Steps: Add a firewall rule to block the specific port on the computer on which you installed Symantec Endpoint Protection Manager. This firewall rule should apply to all hosts and all applications.

     

    To confirm that the rule applied successfully, simply telnet to the port. If the rule is configured correctly, the firewall successfully blocks traffic and does not permit a connection on the port.

     

    Note: For instructions on creating a firewall rule using the Symantec Endpoint Protection client, please see HOWTO81156: Adding a new firewall rule. If you configure the policy from the Symantec Endpoint Protection Manager, you will need to wait for the policy to propagate to the Symantec Endpoint Protection client installed on the SEPM server prior to testing. To force the SEP client to download the modified policy immediately, right-click the SEP system-tray icon and click Update Policy.

     

    Implications: If an administrator logs in to the SEPM with port 8445 blocked, the first three reporting tabs (Home, Monitors, and Reports) will not display in the Remote Java console. Blocking port 8445 will deny access to the Remote Reporting Console as well. Administrators may configure firewall rules to allow access to port 8445 or 443 from explicit hosts, IP addresses, or IP address ranges to enable these features.

     

    Secure client/server communications: If FIPS mode is enabled, or if SEP has been configured to use secure client/server communication, port 443 is used for client/server communications. In these cases, port 443 should be restricted. Blocking port 443 denies communication to and from all clients that are using secure communication. Administrators can configure firewall rules to allow access to port 443 from explicit hosts, IP addresses, or IP address ranges to enable these features



  • 8.  RE: OpenSSL

    Posted Apr 10, 2014 12:55 PM

    Thanks alot for sharing this info



  • 9.  RE: OpenSSL

    Posted Apr 10, 2014 04:23 PM

    New info:

    http://www.symantec.com/docs/TECH216558



  • 10.  RE: OpenSSL

    Broadcom Employee
    Posted Apr 11, 2014 02:32 AM

    Hello,

    Symantec is investigating this issue.

    Which versions are impacted?
    1. Symantec Endpoint Protection clients are not impacted.
    2. No versions of Symantec Endpoint Protection 11 (SEP) are impacted. They use an earlier version of OpenSSL which is not vulnerable.
    3. SEPM 12.1 RTM to SEPM 12.1 RU1 MP1 are not impacted. They use an earlier version of OpenSSL that is not vulnerable.
    4. SEPM 12.1 RU2 to SEPM 12.1 RU4 MP1 (inclusive) are vulnerable. They utilize OpenSSL 1.0.1.
     
    Will Symantec be releasing a version of SEP to address this?
    Yes. Symantec engineering is currently working on a version of the Symantec Endpoint Protection Manager to address this issue. This article will be updated when the new version is available. Subscribe to this article to be notified of any changes to this article.
     
    Customers using an affected version should block general access to port 8445 on their SEPM to mitigate this vulnerability until a product update is available. 
     
    Reference: Is Symantec Endpoint Protection affected by the Heartbleed OpenSSL vulnerability (CVE-2014-0160)
     


  • 11.  RE: OpenSSL

    Posted Apr 11, 2014 02:33 AM

    Also see this page:

    Heartbleed Vulnerability
    http://www.symantec.com/outbreak/?id=heartbleed



  • 12.  RE: OpenSSL

    Posted Apr 11, 2014 04:43 AM

    Also: if the SEP client defending the SEPM has its IPS component in place, this IPS signature will offer protection:

    Attack: OpenSSL Heartbleed CVE-2014-0160 3

    http://www.symantec.com/security_response/attacksignatures/detail.jsp?asid=27517

    This signature was added in Security Update: 772 [Extended version: April 10, 2014 Rev: 012]

    IPS is a crucial part of today's defenses.

    Two Reasons why IPS is a "Must Have" for your Network

    https://www-secure.symantec.com/connect/articles/two-reasons-why-ips-must-have-your-network

     

     

    Hope this helps!

    Mick



  • 13.  RE: OpenSSL

    Posted Apr 25, 2014 10:10 AM

    Followers of this thread may be interested in attending Symantec's webcast on Tuesday the 29th.  The following blog post has all the details and a link to the registration page

    The Heartbleed Bug: How to Protect Your Business
    https://www-secure.symantec.com/connect/blogs/heartbleed-bug-how-protect-your-business

    With thanks and best regards,

    Mick