NetApp Product Security Notice for WannaCrypt and Petya Ransomware

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp.

Summary

On Friday, May 12, 2017 a new ransomware variant began infecting systems across the world. This ransomware is known by several names, some of which are WannaCrypt, WannaCry, WanaCrypt0r, WCrypt, and WCRY. It rapidly spreads by taking advantage of a flaw in Microsoft Windows SMBv1 that was addressed as part of Microsoft Security Bulletin MS17-010. On Tuesday, June 27, 2017 another ransomware spread across the world by taking advantage of the flaws addressed in MS17-010. This new ransomware appears to be a variant of the existing Petya ransomware.

While file systems mounted to infected clients may be encrypted, NetApp read-only snapshots may assist in restoring data to impacted systems. Additional information regarding the NetApp solution for Ransomware can be found in TR-4572: http://www.netapp.com/us/media/tr-4572.pdf

No NetApp products are known to be vulnerable to this ransomware or MS17-010.

Impact

There is no known impact to NetApp products.

Affected Microsoft Windows systems may encrypt data mounted from NetApp storage.

Vulnerability Scoring Details

CVE Score Vector
CVE-2017-0143 8.1 (HIGH) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-0144 8.1 (HIGH) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-0145 8.1 (HIGH) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-0146 8.1 (HIGH) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2017-0147 5.9 (MEDIUM) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2017-0148 8.1 (HIGH) CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

None.

Products Not Affected

  • 7-Mode Transition Tool
  • ATTO FibreBridge
  • Active IQ Performance Analytics Services
  • AutoSupport, MySupport,support.netapp.com
  • Brocade Fabric Operating System Firmware
  • Brocade Network Advisor Software
  • Brocade Network Operating System Firmware
  • Cloud Control
  • Cloud Portal
  • Cloud Sync
  • Cluster Network Switch (NetApp CN1610)
  • Clustered Data ONTAP
  • Clustered Data ONTAP Antivirus Connector
  • Data ONTAP Edge
  • Data ONTAP operating in 7-Mode
  • E-Series SANtricity Management Plug-ins (VMware vCenter)
  • E-Series SANtricity OS Controller Software 11.30 and later
  • E-Series SANtricity OS Controller Software 8.x
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • FAS/AFF Baseboard Management Controller (BMC)
  • FAS/AFF System Firmware
  • HCI/Solidfire System Firmware
  • Host Utilities - SAN for ESX
  • Host Utilities - SAN for Unix and Linux
  • Host Utilities - SAN for Windows
  • MetroCluster Tiebreaker for clustered Data ONTAP
  • Multipath I/O (Data ONTAP DSM for Windows MPIO)
  • NetApp Cloud Backup
  • NetApp Cloud Backup OST Plug-in
  • NetApp Converged Systems Advisor
  • NetApp HCI Compute Nodes
  • NetApp HCI Storage Nodes
  • NetApp Host Agent
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp Plug-in for Symantec NetBackup
  • NetApp SANtricity Cloud Connector
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp Service Level Manager
  • NetApp SolidFire Element OS Management Node
  • NetApp SteelStore Cloud Integrated Storage
  • NetApp Storage Encryption
  • NetApp VASA Provider for Clustered Data ONTAP 7.0 and above
  • ONTAP Select Deploy administration utility
  • OnCommand API Services
  • OnCommand Cloud Manager
  • OnCommand Insight
  • OnCommand Plug-in for Microsoft
  • OnCommand System Manager
  • OnCommand Unified Manager for 7-Mode (core package)
  • OnCommand Unified Manager for Linux 7.2 and above
  • OnCommand Unified Manager for VMware vSphere 7.2 and above
  • OnCommand Unified Manager for Windows 7.2 and above
  • OnCommand Workflow Automation
  • Open Systems SnapVault Agent
  • Perfstat
  • RAID Controller CTS2600 Legacy Engenio
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapCenter Server
  • SnapDrive for Unix
  • SnapDrive for Windows
  • SnapManager for Exchange
  • SnapManager for Hyper-V
  • SnapManager for MS SQL
  • SnapManager for Oracle
  • SnapManager for SAP
  • SnapManager for Sharepoint
  • SnapProtect
  • SolidFire Element OS
  • SolidFire VMware vCenter Plug-in
  • Storage Automation Store
  • Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 4.x and above
  • Storage Replication Adapter for Clustered Data ONTAP for Windows 4.x and above
  • Storage Services Connector
  • StorageGRID
  • StorageGRID Webscale
  • System Setup
  • Virtual Storage Console for VMware vSphere 7.0 and above

Software Versions and Fixes

None.

This section will be updated as patches are released.

Workarounds

Disable or block SMBv1 on vulnerable Microsoft Windows systems to minimize the spread of the ransomware software. As a best practice, update antivirus and malware detection signatures.

Users of Microsoft Windows should apply Microsoft security patches published on March 14, 2017 and identified as the MS17-010 Security Update to vulnerable systems.
 
NetApp read-only snapshots may assist in restoring data to impacted systems. Additional information regarding the NetApp solution for Ransomware can be found in TR-4572: http://www.netapp.com/us/media/tr-4572.pdf

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/NOW/cgi-bin/software/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20170515-0001

Revision History

Revision # Date Comments
1.0 20170515 Initial Public Release
2.0 20170518 Added ICS-CERT WannaCry Fact Sheet link
3.0 20170628 Added Petya ransomware information
4.0 20170705 Added CVE IDs for MS17-010, Final status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2017 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.