OpenSSL Heartbeat Extension Vulnerability in Multiple NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20140410-0001 updates
Subscribe to NTAP-20140410-0001 advisory updates
Unsubscribe from NTAP-20140410-0001 advisory updates
Unsubscribe from NTAP-20140410-0001 advisory updates
Advisory ID: NTAP-20140410-0001 Version: 17.0 Last updated: 07/17/2018 Status: Final. CVEs: CVE-2014-0160
Summary
Multiple NetApp products incorporate the OpenSSL software libraries to provide cryptographic capabilities. The OpenSSL 1.0.1 releases prior to 1.0.1g are affected by a vulnerability known as Heartbleed that can allow an unauthenticated remote attacker to retrieve up to 64 kilobytes of memory from a connected client or server using Transport Layer Security (TLS). The vulnerability is due to a missing bounds check in the TLS Heartbeat Extension in OpenSSL. This advisory was formerly referred as NTAP-20140410-heartbleed.
Impact
Successful exploitation of this vulnerability may cause disclosure of memory contents from clients and servers.
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2014-0160 | 8.9 (HIGH) | AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:U/RC:C |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
Affected Products
- Clustered Data ONTAP Antivirus Connector
- FlashRay
- NetApp Cloud Backup
- NetApp Manageability SDK
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- OnCommand Performance Manager (Unified Manager Performance Pkg)
- OnCommand Unified Manager for 7-Mode (core package)
- OnCommand Workflow Automation
- SnapProtect
Products Not Affected
- 7-Mode Transition Tool
- ATTO FibreBridge
- AutoSupport, MySupport,support.netapp.com
- Brocade Fabric Operating System Firmware
- Brocade Network Advisor Software
- Brocade Network Operating System Firmware
- Cluster Network Switch (NetApp CN1610)
- Clustered Data ONTAP
- Data ONTAP Edge
- Data ONTAP operating in 7-Mode
- E-Series SANtricity Management Plug-ins (VMware vCenter)
- E-Series SANtricity OS Controller Software 8.x
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- FAS/AFF System Firmware
- Host Utilities - SAN for ESX
- Host Utilities - SAN for Unix and Linux
- Host Utilities - SAN for Windows
- Multipath I/O (Data ONTAP DSM for Windows MPIO)
- NetApp Host Agent
- NetApp NFS Plug-in for VMware VAAI
- NetApp Plug-in for Symantec NetBackup
- NetApp Storage Encryption
- NetApp VASA Provider for Clustered Data ONTAP 7.0 and above
- OnCommand Balance
- OnCommand Cloud Manager
- OnCommand Insight
- OnCommand Plug-in for Microsoft
- OnCommand System Manager
- OnCommand Unified Manager for Clustered Data ONTAP
- Open Systems SnapVault Agent
- RAID Controller CTS2600 Legacy Engenio
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapDrive for Unix
- SnapDrive for Windows
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for MS SQL
- SnapManager for Oracle
- SnapManager for SAP
- SnapManager for Sharepoint
- Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above
- Storage Services Connector
- StorageGRID
- StorageGRID Webscale
- System Setup
- Virtual Storage Console for VMware vSphere 7.0 and above
Software Versions and Fixes
NetApp's currently available patches are listed below.
Product | First Fixed in Release |
---|---|
NetApp Cloud Backup |
https://mysupport.netapp.com/NOW/download/software/steelstore/3.2/ After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
FlashRay |
After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
OnCommand Performance Manager (Unified Manager Performance Pkg) |
After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
NetApp SANtricity SMI-S Provider |
http://mysupport.netapp.com/NOW/apbu/oemcp/protcd/smi-s/ After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
SnapProtect |
http://mysupport.netapp.com/NOW/download/software/snapprotect_sp/10.0SP6/ After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
NetApp SMI-S Provider |
http://mysupport.netapp.com/NOW/download/software/smis/Linux/5.1P1/ http://mysupport.netapp.com/NOW/download/software/smis/Windows/5.1P1/ After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
Clustered Data ONTAP Antivirus Connector |
After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
OnCommand Unified Manager for 7-Mode (core package) |
https://mysupport.netapp.com/NOW/download/software/occore_win/5.2.1/ https://mysupport.netapp.com/NOW/download/software/occore_lin/5.2.1/ http://mysupport.netapp.com/NOW/download/software/occore_lin/5.2R1/ http://mysupport.netapp.com/NOW/download/software/occore_win/5.2R1/ http://mysupport.netapp.com/NOW/download/software/occore_lin/5.1P1/ http://mysupport.netapp.com/NOW/download/software/occore_win/5.1P1/ |
NetApp Manageability SDK |
http://mysupport.netapp.com/NOW/download/software/nmsdk/5.2.1R1/ http://mysupport.netapp.com/NOW/download/software/nmsdk/5.1R1/ After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
OnCommand Workflow Automation |
http://mysupport.netapp.com/NOW/download/software/ocwfa/2.2RC1R1/ After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems. |
Workarounds
Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) products available from third parties may have signatures available to stop an attack. Contact your security product vendors for additional information.
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20140410-0001
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20140410 | Initial Public Release |
2.0 | 20140410 | Additional Product Info |
3.0 | 20140411 | Additional Product Info, Removed Confidentiality Notice |
4.0 | 20140414 | Additional Product Info, minor corrections |
5.0 | 20140415 | Additional Product Info |
6.0 | 20140416 | Additional Product Info |
7.0 | 20140418 | Additional Product Info |
8.0 | 20140421 | Additional Product Info |
8.1 | 20140421 | Additional Product Info |
9.0 | 20140424 | After further investigation, Clustered Data ONTAP Antivirus connector does not implement OpenSSL in a vulnerable manner and has been removed from the vulnerable product list, added fixed products |
10.0 | 20140430 | Added E-series SMI-S provider fix |
11.0 | 20140502 | Added DataFort products |
12.0 | 20140609 | Added legacy DataFabric Manager and OnCommand Report, SnapProtect fix |
13.0 | 20140620 | Added final patches |
14.0 | 20140930 | KB transition - no content change |
15.0 | 20141013 | Removed statements regarding further updates due to final status, added link to the advisory, formatting |
16.0 | 20150227 | Added NetApp SteelStore Cloud Integrated Storage fix link |
17.0 | 20180717 | Advisory id changed from NTAP-20140410-heartbleed to NTAP-20140410-0001 |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.