SMB Vulnerabilities in Multiple NetApp Products

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

Summary

Multiple NetApp products implement the SMB protocol. Systems that implement the SMB protocol can be susceptible to one or more man-in-the-middle attacks which when exploited could potentially lead to information disclosure, privilege escalation, or a Denial of Service. The most well-known of these vulnerabilities is referred to as Badlock. This advisory will be updated as additional information becomes available.

Impact

Exploitation of these vulnerabilities could potentially lead to information disclosure, privilege escalation, or a Denial of Service.
 

CVE Description
CVE-2016-3400 Data ONTAP operating in 7-Mode is susceptible to a SMB man-in-the-middle attack.
CVE-2016-3997 Clustered Data ONTAP is susceptible to a SMB man-in-the-middle attack in its default state due to SMB signing enforcement not being enabled.
CVE-2016-2118 StorageGRID and StorageGRID Webscale relies on Samba, which is susceptible to a man-in-the-middle attack when the SAMR and LSAD protocols are used directly over TCP rather than over SMB named pipes. This vulnerability is referred to as Badlock. 
  • NOTE: Clustered Data ONTAP is not affected by the vulnerabilities referred to as Badlock as it does not support the DCERPC protocol over TCP. Other SMB-based man-in-the-middle attacks can be mitigated by enabling SMB signing.
  • NOTE: Data ONTAP operating in 7-Mode is not affected by the vulnerabilities referred to as Badlock as it does not support the DCERPC protocol over TCP. Consult the workarounds section for mitigation of other SMB-based man-in-the-middle attacks.
  • NOTE: NetApp AltaVault is not affected by the vulnerabilities referred to as Badlock as it does not support the SAMR or LSAD protocols.
CVE-2016-3998 NetApp AltaVault versions 4.1 and below are susceptible to a SMB man-in-the-middle attack. 

Vulnerability Scoring Details

CVE Score Vector
CVE-2016-2118 6.1 (MEDIUM) AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:C
CVE-2016-3400 8.4 (HIGH) AV:N/AC:M/Au:N/C:C/I:C/A:C/E:POC/RL:U/RC:C
CVE-2016-3997 6.1 (MEDIUM) AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:U/RC:C
CVE-2016-3998 5.8 (MEDIUM) AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:U/RC:C

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • Clustered Data ONTAP
  • Data ONTAP operating in 7-Mode
  • NetApp Cloud Backup (formerly AltaVault)
  • StorageGRID (formerly StorageGRID Webscale)
  • StorageGRID9 (9.x and prior)

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge
  • Brocade Fabric Operating System Firmware
  • Brocade Network Advisor Software
  • Clustered Data ONTAP Antivirus Connector
  • E-Series SANtricity Management Plug-ins (VMware vCenter)
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF BIOS
  • Host Utilities - SAN for Linux
  • Host Utilities - SAN for Windows
  • MetroCluster Tiebreaker for clustered Data ONTAP
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp Plug-in for Symantec NetBackup
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp Storage Encryption
  • NetApp VASA Provider for Clustered Data ONTAP 7.2 and above
  • OnCommand API Services
  • OnCommand Cloud Manager
  • OnCommand Insight
  • OnCommand System Manager 9.x
  • OnCommand Unified Manager for 7-Mode (core package)
  • OnCommand Workflow Automation
  • Open Systems SnapVault Agent
  • RAID Controller CTS2600 Legacy Engenio
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapCenter
  • SnapDrive for Unix
  • SnapDrive for Windows
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for MS SQL
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 7.2 and above
  • Storage Services Connector
  • System Setup
  • Virtual Storage Console for VMware vSphere 7.2 and above

Software Versions and Fixes

NetApp's currently available patches are listed below.


Product First Fixed in Release
StorageGRID9 (9.x and prior) https://kb.netapp.com/support/index?page=content&id=1015731

Follow the linked instructions to upgrade Samba.
NetApp Cloud Backup (formerly AltaVault) http://mysupport.netapp.com/NOW/download/software/altavault_ava800/4.2/
http://mysupport.netapp.com/NOW/download/software/altavault_phyapp/4.2/
http://mysupport.netapp.com/NOW/download/software/altavault_virtualapp/4.2/
Data ONTAP operating in 7-Mode http://mysupport.netapp.com/NOW/download/software/ontap/8.2.4P4/

Option cifs.smbx_signing_required was added to enforce SMB1 signing.
StorageGRID (formerly StorageGRID Webscale) https://mysupport.netapp.com/NOW/download/software/storagegrid_webscale/11.0/
Clustered Data ONTAP https://library.netapp.com/ecmdocs/ECMP1366834/html/GUID-9C1135BA-5DEB-4E0F-9F58-3AED83DA1DD3-copy.html
http://www.netapp.com/us/media/tr-4191.pdf

Enable SMB signing following the ONTAP 8.2 product documentation. Additional information can be found in the Best Practices Guide for Clustered Data ONTAP 8.2.x and 8.3.x Windows File Services Technical Report.

Workarounds

  1. Risk can be lowered by avoiding login/authentication of privileged accounts over unprotected networks. If possible, administrators should limit the use of privileged SMB sessions to trusted networks as a partial mitigation to man-in-the-middle attacks.
  2. Data ONTAP operating in 7-Mode prior to version 8.2.4P3D1 is capable of enforcing SMB2 signing but is not capable of enforcing SMB1 signing or completely disabling SMB1. To mitigate potential SMB man-in-the-middle attacks perform both of the following:
    • Enforce SMB2 signing in Data ONTAP operating in 7-Mode
    • Disable SMB1 negotiation on all clients accessing Data ONTAP operating in 7-Mode SMB shares
  3. Follow these instructions to upgrade Samba on StorageGRID9 (9.x and prior): https://kb.netapp.com/support/index?page=content&id=1015731

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/site/downloads/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20160412-0001

Revision History

Revision # Date Comments
1.0 20160412 Initial Public Release
2.0 20160412 Added Bugs Online links to affected products, formatted CVSS v2 scores, added Samba reference link
3.0 20160418 Clustered Data ONTAP added to Software Versions and Fixes & note regarding Clustered Data ONTAP added to Affected Products
4.0 20160419 Per-product information added to Impact; NetApp AltaVault & Data ONTAP operating in 7-Mode notes added to Affected Products; Workarounds updated
5.0 20160518 Data ONTAP operating in 7-Mode, StorageGRID & StorageGRID Webscale added to Software Versions and Fixes
6.0 20160913 Updated Workarounds and Software Version and Fixes for StorageGRID Webscale
7.0 20170221 Corrected the Data ONTAP operating in 7-Mode option cifs.smbx_signing_required.
8.0 20170512 NetApp AltaVault added to Software Versions and Fixes, Final status
9.0 20191220 Updated Workarounds and Software Version and Fixes for StorageGRID (formerly StorageGRID Webscale) with fix link

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.