[sssForm]

Security Advisory

CVE-2019-0140 – Ethernet Controller Firmware
Published: April 24, 2020
Last Update: April 24, 2020
Summary

In November 2019, Intel published vulnerabilities affecting Intel 700 Series Ethernet Controllers [1].  For A10 Networks, CVE-2019-0140 [2] may allow an escalation of privilege, denial of service or information disclosure. This vulnerability requires adjacent access to the system to exploit the flaw in the controller firmware.

 

Item# Vulnerability ID Score Source Score Summary
1 CVE-2019-0140 CVSS 3.0 8.8 High Buffer overflow in Intel Ethernet 700 Series firmware, privilege escalation via an adjacent access
Affected Releases

This is not a vulnerability in ACOS. Rather, this is a vulnerability in the firmware of Intel 700 Series Ethernet Controllers.  A10 Networks TH-3040 devices manufactured before April 2020 may have firmware vulnerable to this issue. See the mitigations procedure below for instructions on updating the Intel ethernet controller firmware in affected TH-3040 devices.

Intel 700 Series controllers may also be used in vThunder or Bare Metal ACOS systems.  It is the responsibility of the customer in these cases to ensure that Intel 700 Series ethernet controller firmware is updated as appropriate to ensure that these systems are not exposed to this vulnerability.

Workarounds and Mitigations

The following mitigation procedure is recommended for all A10 Networks TH-3040 devices manufactured before April 2020, to upgrade their underlying Intel 700 Series Controller firmware.

First, download the “TH3040-update-cve-2019-0140.upg” file from the A10 Networks support software download site to a local system accessible to the TH-3040 device.

Second, update the ethernet controller firmware for A10 Networks TH-3040 devices by using the “upgrade” command in config mode.


ACOS(config)# upgrade hd pri use-mgmt-port scp://user@/home/user/TH3040-update-cve-2019-0140.upg
Password []?

Do you want to reboot the system after the upgrade?[yes/no]:yes
Expand the upgrade package now ...

Done (0 minutes 1 seconds)
Upgrade ...
Upgrade failed
ACOS(config)(LOADING)#[446354.863762] reboot: Restarting system

 

The command output will indicate that the “Upgrade failed” when updating the firmware even when the firmware update succeeds. This merely indicates the ACOS software of the device was not changed and this is expected to be displayed.
The device will reboot after the upgrade command. This is required and will happen even if a “no” response is given to the question “Do you want to reboot the system after the upgrade?”.

Lastly, verify the results of the firmware update operation by viewing the varlog logging entries. Entries similar to the following will indicate that the firmware was successfully updated, by showing the original version followed by the new updated version.


show varlog tail 1000 | inc firmware
Mar 13 03:39:21 localhost axlog: firmware-version: 5.02 0x80002470 0.0.0
Mar 13 03:41:53 localhost axlog: firmware-version: 7.10 0x800077fd 0.0.0

Entries similar to the following will indicate that the Intel 700 Series firmware was already sufficiently up to date and not exposed to this vulnerability.

Mar 13 04:11:35 localhost axlog: firmware already update to latest 0x800077fd

If this upgrade is applied to an A10 Networks device that is not a TH-3040, the command will fail as shown below.

Checking integrity of upgrade package ...
Incorrect software for the model

Software Updates

Software updates that address these vulnerabilities are or will be published at the following URL, near the bottom in the “Other Updates and Tools” section with the heading “Thunder 3040 Firmware Security Update for CVE-2019-0140”:

http://www.a10networks.com/support/axseries/software-downloads

Vulnerability Details

The following table shares brief descriptions for the vulnerabilities addressed in this document.

Vulnerability ID Vulnerability Description
CVE-2019-0140

Buffer overflow in firmware for Intel(R) Ethernet 700 Series Controllers before version 7.0 may allow an unauthenticated user to potentially enable an escalation of privilege via an adjacent access.

Acknowledgements

None

Modification History
Revision Date Description
1.0 April 24, 2020

2020-04-24 Initial Publication


© Copyright 2020  A10 Networks, Inc. All Rights Reserved.

This document is provided on an "AS IS" basis and does not imply any kind of guarantee or warranty, including the warranties of merchantability, non-infringement or fitness for a particular use. Your use of the information in this document or materials linked from this document is at your own risk. A10 Networks, Inc. reserves the right to change or update the information in this document at any time.