Vulnerabilities > CVE-2017-12421 - Unspecified vulnerability in Netapp Clustered Data Ontap

047910
CVSS 8.8 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
LOW
Confidentiality impact
HIGH
Integrity impact
HIGH
Availability impact
HIGH
network
low complexity
netapp
nessus

Summary

NetApp Clustered Data ONTAP 8.3.x before 8.3.2P12 allows remote authenticated users to execute arbitrary code on the storage controller via unspecified vectors.

Nessus

NASL familyMisc.
NASL idNETAPP_ONTAP_NTAP-20170831-0002.NASL
descriptionThe version of NetApp Clustered Data ONTAP running on the remote host is 8.3.x prior to 8.3.2P12. It is, therefore, affected by unspecified flaws in Storage Virtual Machines (SVMs) that allow an authenticated remote attacker to gain access to potentially sensitive information and execute arbitrary code on the storage controller. Note that Nessus has not tested for these issues but has instead relied only on the application
last seen2020-06-01
modified2020-06-02
plugin id103926
published2017-10-18
reporterThis script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/103926
titleNetApp Clustered Data ONTAP 8.x < 8.3.2P12 (NTAP-20170831-0002)
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(103926);
  script_version("1.4");
  script_cvs_date("Date: 2019/11/12");

  script_cve_id("CVE-2017-12421", "CVE-2017-12423");

  script_name(english:"NetApp Clustered Data ONTAP 8.x < 8.3.2P12 (NTAP-20170831-0002)");
  script_summary(english:"Checks the version of ONTAP.");

  script_set_attribute(attribute:"synopsis", value:
"The remote host is affected by a heap overflow vulnerability.");
  script_set_attribute(attribute:"description", value:
"The version of NetApp Clustered Data ONTAP running on the remote
host is 8.3.x prior to 8.3.2P12. It is, therefore, affected by
unspecified flaws in Storage Virtual Machines (SVMs) that allow an
authenticated remote attacker to gain access to potentially sensitive
information and execute arbitrary code on the storage controller.

Note that Nessus has not tested for these issues but has instead
relied only on the application's self-reported version number.");
  # https://kb.netapp.com/support/s/article/NTAP-20170831-0002?language=en_US
  script_set_attribute(attribute:"see_also", value:"http://www.nessus.org/u?64357134");
  script_set_attribute(attribute:"solution", value:
"Upgrade to NetApp Clustered Data ONTAP version 8.3.2P12 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:S/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2017-12421");

  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2017/09/05");
  script_set_attribute(attribute:"patch_publication_date", value:"2017/09/05");
  script_set_attribute(attribute:"plugin_publication_date", value:"2017/10/18");

  script_set_attribute(attribute:"plugin_type", value:"local");
  script_set_attribute(attribute:"cpe", value:"cpe:/o:netapp:data_ontap");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_family(english:"Misc.");

  script_copyright(english:"This script is Copyright (C) 2017-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");

  script_dependencies("netapp_ontap_detect.nbin");
  script_require_keys("Host/NetApp/ONTAP/display_version", "Host/NetApp/ONTAP/version", "Host/NetApp/ONTAP/mode", "Host/NetApp/ONTAP/cluster");

  exit(0);
}

include("vcf.inc");

app_name = "NetApp ONTAP";

cluster = get_kb_item_or_exit("Host/NetApp/ONTAP/cluster");

# Not vulnerable if not running in Clustered mode
if (!cluster)
  audit(AUDIT_OS_CONF_NOT_VULN, app_name);

app_info = vcf::get_app_info(app:app_name, kb_ver:"Host/NetApp/ONTAP/display_version");

vcf::check_granularity(app_info:app_info, sig_segments:2);

constraints = [
  { "min_version" : "8.3",  "fixed_version" : "8.3.2P12" }
];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_WARNING);