• The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
Menu
  • The Four Hundred
  • Subscribe
  • Media Kit
  • Contributors
  • About Us
  • Contact
  • Critical Security Vulnerability In PowerVM Hypervisor

    May 22, 2023 Timothy Prickett Morgan

    IBM’s Product Security Incident Response Team (PSIRT) put out a notice on Wednesday, May 17, to inform the Power Systems installed base that there is a very serious security vulnerability in the PowerVM hypervisor. You can see the PSIRT notice at this link and the Security Bulletin: This Power System firmware update is being released to address CVE 2023-30438 at this link. This has a CVSS base score of 9.3, which means it is critical.

    We very rarely see any security vulnerabilities being reported for the PowerVM hypervisor or for the IBM i operating system itself, for that matter, so this one took us a little by surprise. And Big Blue reached out to us immediately to tell us about the situation and the mitigations for the vulnerability because PowerVM is so pervasively installed on Power Systems iron.

    Here’s the description of the situation: “An internally discovered vulnerability in PowerVM, on Power9 and Power10 systems. This vulnerability could allow an attacker with privileged user access to a logical partition to perform an undetected violation of the isolation between logical partitions. This could lead to data leakage or the execution of arbitrary code in other logical partitions on the same physical server.”

    IBM found this potential bug in the firmware that is used on Power9 and Power10 systems, and says that machines that use Power8 and earlier servers, which use the OP9XX firmware releases, cannot be attacked through this vulnerability. As far as IBM knows, no one has been attacked through this vulnerability, but you have to patch your system right now to make sure you are not the first.

    We had originally thought that there might be a vulnerability in the Virtual LAN software stack that has been resident in the OS/400, i5/OS, and IBM i operating system running PowerVM and earlier hypervisors, but it doesn’t sound like it. Or, IBM changed something fundamental in this VLAN setup with the Power9 and Power10 machines and it was not changed with earlier hardware. (VLAN allows the NUMA connections between processors to act as a virtual local area network to link logical partitions within a single physical machine, which is obviously has a lot lower latency and a lot higher bandwidth than going from one VM through a slice of a physical Ethernet card and then over the switching infrastructure and back in through another slice of a physical Ethernet card to another VM to link them.)

    IBM says that any Power9 or Power10 server identified in the Security Bulletin with multiple partitions is potentially affected; no matter how the partitions were created or managed. There is a bit of a wonky situation on certain Power10 machines when it comes to patching, so pay attention. A Power10 system running firmware below FW1010.10 will need to apply the fix disruptively, which means that the server must be powered off to apply the fix and eliminate this vulnerability. Any higher firmware levels on the Power10 machines can have the patch applied concurrently while the machine is still running and it will be locked down.

    IBM “strongly recommends” customers with Power9 machinery install FW950.71(950_124) or newer to remediate this vulnerability. Those with Power E1080 servers need to install FW1010.51(1010_163), FW1030.11(1030_052) or newer to remediate, and those on the other Power10-based systems need to install FW1020.31(1020_102), FW1030.11(1030_058) or newer to remediate.

    Finally, for those of you who are on the IBM Cloud running Power Systems Virtual Server slices, these cloud instances were indeed exposed to this vulnerability and all servers on the IBM Cloud running Power9 and Power10 iron – which means all of them because there are no Power8 or earlier machines on the Power VS offering – have been patched, top to bottom.

    RELATED STORIES

    PowerVM, vHMC, HMC, And Cloud Management Console Get Their Tweaks

    Critical Log4j Vulnerability Hits Everything, Including the IBM i Server

    Some Good Advice About Log4j Mitigation Gotchas

    IBM Winds Down PowerVM V2, Nudges Customers To PowerVM V3

    PowerVM: The i Hypervisor Is Not Hidden Anymore

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    Tags: Tags: i5/OS, IBM i, OS/400, Power E1080, Power Systems, Power10, Power8, Power9, PowerVM

    Sponsored by
    WorksRight Software

    Do you need area code information?
    Do you need ZIP Code information?
    Do you need ZIP+4 information?
    Do you need city name information?
    Do you need county information?
    Do you need a nearest dealer locator system?

    We can HELP! We have affordable AS/400 software and data to do all of the above. Whether you need a simple city name retrieval system or a sophisticated CASS postal coding system, we have it for you!

    The ZIP/CITY system is based on 5-digit ZIP Codes. You can retrieve city names, state names, county names, area codes, time zones, latitude, longitude, and more just by knowing the ZIP Code. We supply information on all the latest area code changes. A nearest dealer locator function is also included. ZIP/CITY includes software, data, monthly updates, and unlimited support. The cost is $495 per year.

    PER/ZIP4 is a sophisticated CASS certified postal coding system for assigning ZIP Codes, ZIP+4, carrier route, and delivery point codes. PER/ZIP4 also provides county names and FIPS codes. PER/ZIP4 can be used interactively, in batch, and with callable programs. PER/ZIP4 includes software, data, monthly updates, and unlimited support. The cost is $3,900 for the first year, and $1,950 for renewal.

    Just call us and we’ll arrange for 30 days FREE use of either ZIP/CITY or PER/ZIP4.

    WorksRight Software, Inc.
    Phone: 601-856-8337
    Fax: 601-856-9432
    Email: software@worksright.com
    Website: www.worksright.com

    Share this:

    • Reddit
    • Facebook
    • LinkedIn
    • Twitter
    • Email

    IBM Power: Hosted On-Premises Or In The Cloud? Update On Critical Security Vulnerability In PowerVM

    2 thoughts on “Critical Security Vulnerability In PowerVM Hypervisor”

    • ema tissani says:
      May 22, 2023 at 4:10 am

      thanks Timothy, appreciate the warning, we’ll patch next windows along with the next TR/PTF.

      Reply
    • Peter Langhammer says:
      May 22, 2023 at 12:44 pm

      Updating from fw1030.10(045) right now to (060) on a Power10 9105-41B
      And THIS IS disruptive.

      Reply

    Leave a Reply Cancel reply

TFH Volume: 33 Issue: 31

This Issue Sponsored By

  • Fresche Solutions
  • Racksquared
  • DRV Technologies, Inc.
  • PERFSCAN
  • WorksRight Software

Table of Contents

  • Critical Security Vulnerability In PowerVM Hypervisor
  • IBM Power: Hosted On-Premises Or In The Cloud?
  • Guru: Watch Out For This Pitfall When Working With Integer Columns
  • As I See It: Bob-the-Bot
  • IBM i PTF Guide, Volume 25, Number 21

Content archive

  • The Four Hundred
  • Four Hundred Stuff
  • Four Hundred Guru

Recent Posts

  • Tool Aims To Streamline Git Integration For Old School IBM i Devs
  • IBM To Add Full System Replication And FlashCopy To PowerHA
  • Guru: Decoding Base64 ASCII
  • The Price Tweaking Continues For Power Systems
  • IBM i PTF Guide, Volume 27, Numbers 31 And 32
  • You Can Now Get IBM Tech Support For VS Code For i
  • Price Cut On Power S1012 Mini Since Power S1112 Ain’t Coming Until 2026
  • IBM i: Pro and Con
  • As I See It: Disruption
  • IBM i PTF Guide, Volume 27, Number 30

Subscribe

To get news from IT Jungle sent to your inbox every week, subscribe to our newsletter.

Pages

  • About Us
  • Contact
  • Contributors
  • Four Hundred Monitor
  • IBM i PTF Guide
  • Media Kit
  • Subscribe

Search

Copyright © 2025 IT Jungle