CVE-2016-1894 Authentication Bypass Vulnerability in OnCommand Workflow Automation

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

The email subscription feature has been temporarily disabled.

Summary

All versions of OnCommand Workflow Automation below 3.1P2 for both Linux and Windows platforms are susceptible to an authentication bypass vulnerability. A remote unauthenticated attacker could potentially exploit this to obtain sensitive information in cleartext. All customers are STRONGLY urged to upgrade to a fixed version IMMEDIATELY and change passwords for all configured data sources as a precaution.

Impact

Exploitation of this vulnerability may lead to unauthorized disclosure of sensitive information in cleartext, unauthorized modification of information, and/or disruption of service of OnCommand Workflow Automation or its associated data sources.

Vulnerability Scoring Details

CVE Score Vector
CVE-2016-1894 9.3 (CRITICAL) AV:N/AC:M/Au:N/C:C/I:C/A:C/E:H/RL:U/RC:C

Exploitation and Public Announcements

NetApp is not aware of public discussion regarding this vulnerability.

References

Affected Products

  • OnCommand Workflow Automation

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge - 6500N
  • Brocade Fabric Operating System Firmware
  • Cloud Manager
  • Clustered Data ONTAP
  • Clustered Data ONTAP Antivirus Connector
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF BIOS
  • Host Utilities - SAN for Linux
  • Host Utilities - SAN for Windows
  • MetroCluster Tiebreaker for clustered Data ONTAP
  • NetApp Cloud Backup (formerly AltaVault)
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp Storage Encryption
  • OnCommand Insight
  • Open Systems SnapVault Agent
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapCenter
  • SnapDrive for Unix
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • Storage Services Connector
  • StorageGRID (formerly StorageGRID Webscale)
  • StorageGRID9 (9.x and prior)
  • System Manager 9.x

Software Versions and Fixes

NetApp's currently available patches are listed below.


Product First Fixed in Release
OnCommand Workflow Automation http://mysupport.netapp.com/NOW/download/software/ocwfa/4.0/

Workarounds

None.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/site/downloads/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20160310-0001

Revision History

Revision # Date Comments
1.0 20160311 Initial Public Release; Final status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.