OpenSSL Heartbeat Extension Vulnerability in Multiple NetApp Products

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

Summary

Multiple NetApp products incorporate the OpenSSL software libraries to provide cryptographic capabilities. The OpenSSL 1.0.1 releases prior to 1.0.1g are affected by a vulnerability known as Heartbleed that can allow an unauthenticated remote attacker to retrieve up to 64 kilobytes of memory from a connected client or server using Transport Layer Security (TLS). The vulnerability is due to a missing bounds check in the TLS Heartbeat Extension in OpenSSL. This advisory was formerly referred as NTAP-20140410-heartbleed.

Impact

Successful exploitation of this vulnerability may cause disclosure of memory contents from clients and servers.

Vulnerability Scoring Details

CVE Score Vector
CVE-2014-0160 8.9 (HIGH) AV:N/AC:L/Au:N/C:C/I:C/A:N/E:F/RL:U/RC:C

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • Clustered Data ONTAP Antivirus Connector
  • FlashRay
  • NetApp Cloud Backup
  • NetApp Manageability SDK
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • OnCommand Performance Manager (Unified Manager Performance Pkg)
  • OnCommand Unified Manager for 7-Mode (core package)
  • OnCommand Workflow Automation
  • SnapProtect

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge
  • AutoSupport, MySupport,support.netapp.com
  • Brocade Fabric Operating System Firmware
  • Brocade Network Advisor Software
  • Brocade Network Operating System Firmware
  • Cluster Network Switch (NetApp CN1610)
  • Clustered Data ONTAP
  • Data ONTAP Edge
  • Data ONTAP operating in 7-Mode
  • E-Series SANtricity Management Plug-ins (VMware vCenter)
  • E-Series SANtricity OS Controller Software 8.x
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF System Firmware
  • Host Utilities - SAN for ESX
  • Host Utilities - SAN for Unix and Linux
  • Host Utilities - SAN for Windows
  • Multipath I/O (Data ONTAP DSM for Windows MPIO)
  • NetApp Host Agent
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp Plug-in for Symantec NetBackup
  • NetApp Storage Encryption
  • NetApp VASA Provider for Clustered Data ONTAP 7.0 and above
  • OnCommand Balance
  • OnCommand Cloud Manager
  • OnCommand Insight
  • OnCommand Plug-in for Microsoft
  • OnCommand System Manager
  • OnCommand Unified Manager for Clustered Data ONTAP
  • Open Systems SnapVault Agent
  • RAID Controller CTS2600 Legacy Engenio
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapDrive for Unix
  • SnapDrive for Windows
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for MS SQL
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above
  • Storage Services Connector
  • StorageGRID
  • StorageGRID Webscale
  • System Setup
  • Virtual Storage Console for VMware vSphere 7.0 and above

Software Versions and Fixes

NetApp's currently available patches are listed below.


Product First Fixed in Release
NetApp Cloud Backup https://mysupport.netapp.com/NOW/download/software/steelstore/3.2/

After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
FlashRay
After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
OnCommand Performance Manager (Unified Manager Performance Pkg)
After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
NetApp SANtricity SMI-S Provider http://mysupport.netapp.com/NOW/apbu/oemcp/protcd/smi-s/

After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
SnapProtect http://mysupport.netapp.com/NOW/download/software/snapprotect_sp/10.0SP6/

After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
NetApp SMI-S Provider http://mysupport.netapp.com/NOW/download/software/smis/Linux/5.1P1/
http://mysupport.netapp.com/NOW/download/software/smis/Windows/5.1P1/

After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
Clustered Data ONTAP Antivirus Connector
After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
OnCommand Unified Manager for 7-Mode (core package) https://mysupport.netapp.com/NOW/download/software/occore_win/5.2.1/
https://mysupport.netapp.com/NOW/download/software/occore_lin/5.2.1/
http://mysupport.netapp.com/NOW/download/software/occore_lin/5.2R1/
http://mysupport.netapp.com/NOW/download/software/occore_win/5.2R1/
http://mysupport.netapp.com/NOW/download/software/occore_lin/5.1P1/
http://mysupport.netapp.com/NOW/download/software/occore_win/5.1P1/
NetApp Manageability SDK http://mysupport.netapp.com/NOW/download/software/nmsdk/5.2.1R1/
http://mysupport.netapp.com/NOW/download/software/nmsdk/5.1R1/

After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.
OnCommand Workflow Automation http://mysupport.netapp.com/NOW/download/software/ocwfa/2.2RC1R1/

After applying the fixes, revoke and reissue the applications certificates for the affected services (see product documentation) and change passwords for all accounts that use the affected services and systems.

Workarounds

Intrusion Prevention Systems (IPS) and Intrusion Detection Systems (IDS) products available from third parties may have signatures available to stop an attack. Contact your security product vendors for additional information.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/site/downloads/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20140410-0001

Revision History

Revision # Date Comments
1.0 20140410 Initial Public Release
2.0 20140410 Additional Product Info
3.0 20140411 Additional Product Info, Removed Confidentiality Notice
4.0 20140414 Additional Product Info, minor corrections
5.0 20140415 Additional Product Info
6.0 20140416 Additional Product Info
7.0 20140418 Additional Product Info
8.0 20140421 Additional Product Info
8.1 20140421 Additional Product Info
9.0 20140424 After further investigation, Clustered Data ONTAP Antivirus connector does not implement OpenSSL in a vulnerable manner and has been removed from the vulnerable product list, added fixed products
10.0 20140430 Added E-series SMI-S provider fix
11.0 20140502 Added DataFort products
12.0 20140609 Added legacy DataFabric Manager and OnCommand Report, SnapProtect fix
13.0 20140620 Added final patches
14.0 20140930 KB transition - no content change
15.0 20141013 Removed statements regarding further updates due to final status, added link to the advisory, formatting
16.0 20150227 Added NetApp SteelStore Cloud Integrated Storage fix link
17.0 20180717 Advisory id changed from NTAP-20140410-heartbleed to NTAP-20140410-0001

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.