Prepare to Respond to Critical Vulnerability for Shibboleth Service Providers
This advisory is intended for U-M Shibboleth Service Providers.
Summary
ITS Identity and Access Management (IAM) has been notified of a vulnerability in OpenSAML libraries that could expose Shibboleth Service Providers (SPs) to a critical Single Sign On (SSO) forgery/impersonation attack.
The expectation is that a patch to OpenSAML (not yet released) will fix the vulnerability.
Problem
Exploitation of the vulnerability exposes the SP to a critical SSO forgery/impersonation attack. This is a full break that likely affects every SP dating back to the original 2.0 release.
Threats
Exploitation of the vulnerability has been tested and confirmed in a test environment.
Affected Versions
All versions of Shibboleth SP
Action Items
If you own a site that uses Shibboleth for SSO, plan to take action when the vulnerability details and updates are released.
Technical Details
Technical details have not been released.
How We Protect U-M
ITS provides CrowdStrike Falcon to units, which should be installed on all U-M owned systems (Windows, macOS, and Linux operating systems, whether workstations or servers). Falcon administrators in ITS and in U-M units use the Falcon console to investigate and remediate issues.
Questions, Concerns, Reports
Please contact ITS Information Assurance through the ITS Service Center.