CVE-2015-5600 OpenSSH MaxAuthTries Bypass Vulnerability in NetApp Products

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp.

Summary

Multiple NetApp products incorporate the OpenSSH software libraries. OpenSSH versions below 7.0 are susceptible to a vulnerability that could be exploited to bypass the maximum number of authentication attempts and launch brute force attacks. NetApp is investigating which products use affected versions of OpenSSH. This advisory will be updated as additional information becomes available.

Impact

Exploitation of this vulnerability may lead to brute-force attacks.

Vulnerability Scoring Details

CVE Score Vector
CVE-2015-5600 5.8 (MEDIUM) AV:N/AC:L/Au:N/C:P/I:P/A:N/E:POC/RL:U/RC:C

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • Cluster Network Switch (NetApp CN1610)
  • Clustered Data ONTAP
  • FlashRay
  • NetApp VTL
  • OnCommand Balance
  • OnCommand Performance Manager (Unified Manager Performance Pkg)
  • OnCommand Unified Manager for Clustered Data ONTAP
  • Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above
  • StorageGRID
  • Virtual Storage Console for VMware vSphere 7.0 and above

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge
  • AutoSupport, MySupport,support.netapp.com
  • Brocade Fabric Operating System Firmware
  • Brocade Network Advisor Software
  • Brocade Network Operating System Firmware
  • Clustered Data ONTAP Antivirus Connector
  • Data ONTAP Edge
  • Data ONTAP operating in 7-Mode
  • E-Series SANtricity Management Plug-ins (VMware vCenter)
  • E-Series SANtricity OS Controller Software 8.x
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF System Firmware
  • Host Utilities - SAN for ESX
  • Host Utilities - SAN for Unix and Linux
  • Host Utilities - SAN for Windows
  • Multipath I/O (Data ONTAP DSM for Windows MPIO)
  • NetApp Cloud Backup (formerly AltaVault)
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp Plug-in for Symantec NetBackup
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp Storage Encryption
  • NetApp VASA Provider for Clustered Data ONTAP 7.0 and above
  • OnCommand Cloud Manager
  • OnCommand Insight
  • OnCommand Plug-in for Microsoft
  • OnCommand System Manager
  • OnCommand Unified Manager for 7-Mode (core package)
  • OnCommand Workflow Automation
  • Open Systems SnapVault Agent
  • Perfstat
  • RAID Controller CTS2600 Legacy Engenio
  • RapidData Migration Solution
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapDrive for Unix
  • SnapDrive for Windows
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for MS SQL
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • SnapProtect
  • Storage Replication Adapter for Clustered Data ONTAP for Windows 4.x and above
  • Storage Services Connector
  • StorageGRID Webscale
  • System Setup

Software Versions and Fixes

NetApp's currently available patches are listed below.


Product First Fixed in Release
StorageGRID https://www.suse.com/security/cve/CVE-2015-5600.html
https://kb.netapp.com/support/index?page=content&id=1014874
FlashRay FlashRay has no plans to address this vulnerability. See the EOA announcement for more information.
OnCommand Balance OnCommand Balance has no plans to address this vulnerability. See the EOA announcement for more information.
Clustered Data ONTAP http://mysupport.netapp.com/NOW/download/software/ontap/8.3.1/
Virtual Storage Console for VMware vSphere 7.0 and above https://mysupport.netapp.com/NOW/download/software/vsc_win/7.2/
OnCommand Performance Manager (Unified Manager Performance Pkg) https://mysupport.netapp.com/NOW/download/software/oncommand_pm/7.1/
https://mysupport.netapp.com/NOW/download/software/oncommand_pm_linux/7.1/
Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above https://mysupport.netapp.com/NOW/download/software/sra_cmode/7.2/
OnCommand Unified Manager for Clustered Data ONTAP https://mysupport.netapp.com/NOW/download/software/oncommand_cdot_lin/7.1/
https://mysupport.netapp.com/NOW/download/software/oncommand_cdot_win/7.1/
https://mysupport.netapp.com/NOW/download/software/oncommand_cdot/7.1
NetApp VTL NetApp VTL has no plans to address this vulnerability. See the EOA announcement for more information.
Cluster Network Switch (NetApp CN1610) https://mysupport.netapp.com/NOW/download/software/sanswitch/fcp/NetApp/cn1610cm

Workarounds

None.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/NOW/cgi-bin/software/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20151106-0001

Revision History

Revision # Date Comments
1.0 20151106 Initial Public Release
2.0 20150209 Data ONTAP Edge, StorageGRID moved to Affected Products; StorageGRID added to Software Versions and Fixes; StorageGRID Webscale, Cisco MDS, Cisco Nexus 5k/6k & Cluster Network/Management Switches (Cisco) moved to Products Not Affected
3.0 20160308 NetApp VASA Provider for Clustered Data ONTAP added to Software Versions and Fixes
4.0 20160329 FlashRay removed due to EOL;OnCommand Balance moved from Affected Products to Products Not Affected after investigation showed that it is not exploitable due to the default SSH settings in Debian. OnCommand Unified Manager for Clustered Data ONTAP (6.x) & OnCommand Performance Manager (Unified Manager Performance Pkg) are listed as not affected for the same reason as OnCommand Balance.
5.0 20160831 Formatting; OnCommand Unified Manager for Clustered Data ONTAP (6.x) moved to Products With Revised Vulnerability Status after additional investigation; OnCommand Balance, Cluster Network/Management Switches (NetApp) moved to Affected Products; Data ONTAP Edge moved to Products Not Affected after additional investigation
6.0 20160906 Perfstat moved to Products Not Affected
7.0 20161223 Cluster Network Switch (Cisco Nexus 5596UP/5596T), Fibre Channel Switch (Cisco MDS), and Fibre Channel Switch (Cisco Nexus) moved to Products With Revised Vulnerability Status, OnCommand Unified Manager Core Package (5.x) moved to Products Not Affected
8.0 20170207 OnCommand Performance Manager (Unified Manager Performance Pkg) moved to Products With Revised Vulnerability Status, OnCommand Performance Manager (Unified Manager Performance Pkg) and OnCommand Unified Manager for Clustered Data added to Software Versions and Fixes
9.0 20180122 OnCommand Balance moved to Won't Fix status
10.0 20180424 Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above and Virtual Storage Console for VMware vSphere 7.0 and above moved to Affected Products, Storage Replication Adapter for Clustered Data ONTAP for Windows 4.x and above moved to Products Not Affected
11.0 20180717 Virtual Storage Console for VMware vSphere 7.0 and above, Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above added to Software Versions and Fixes
12.0 20180823 Cluster Network Switch (NetApp CN1610) added to Software Versions and Fixes
13.0 20181121 On further investigation NetApp VASA Provider for Clustered Data ONTAP 7.0 moved to Products Not Affected, Final Status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2017 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.