January 2019 OpenSSH Vulnerabilities in NetApp Products

circle-check-alt This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

Summary

Multiple NetApp products incorporate OpenSSH software libraries. OpenSSH versions through 7.9 are susceptible to vulnerabilities which when successfully exploited could lead to disclosure of sensitive information or the addition or modification of data.

Impact

Successful exploitation of these vulnerabilities could lead to disclosure of sensitive information or the addition or modification of data.

Vulnerability Scoring Details

CVE Score Vector
CVE-2019-6109 4.2 (MEDIUM) CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:L/I:L/A:N
CVE-2019-6110 3.1 (LOW) CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:L/A:N
CVE-2019-6111 5.3 (MEDIUM) CVSS:3.0/AV:N/AC:H/PR:N/UI:R/S:U/C:N/I:H/A:N

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • NetApp Cloud Backup (formerly AltaVault)
  • NetApp SolidFire & HCI Management Node
  • NetApp SteelStore Cloud Integrated Storage
  • ONTAP Select Deploy administration utility

Products Not Affected

  • Active IQ Unified Manager for Linux
  • Active IQ Unified Manager for Microsoft Windows
  • Active IQ Unified Manager for VMware vSphere
  • Active IQ mobile app
  • Astra Trident
  • Brocade Fabric Operating System Firmware
  • Cluster Network Switch (NetApp CN1610)
  • Data ONTAP operating in 7-Mode
  • E-Series SANtricity OS Controller Software 11.x
  • E-Series SANtricity Unified Manager and Web Services Proxy
  • Element Plug-in for vCenter Server
  • FAS/AFF BIOS - 8300/8700/A400/C400
  • FAS/AFF Baseboard Management Controller (BMC) - C190/A150/A220/FAS2720/FAS2750
  • FAS/AFF Service Processor - 8080/8060/8040/8020
  • Host Utilities - SAN for Linux
  • Host Utilities - SAN for Windows
  • IOM6 SAS Disk Shelf Firmware
  • MetroCluster Tiebreaker for clustered Data ONTAP
  • NetApp BlueXP
  • NetApp Converged Systems Advisor Agent
  • NetApp HCI Compute Node (Bootstrap OS)
  • NetApp HCI Compute Node BIOS
  • NetApp HCI Storage Nodes
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp ONTAP PowerShell Toolkit (PSTK)
  • NetApp SolidFire & HCI Storage Node (Element Software)
  • NetApp VASA Provider for Clustered Data ONTAP 9.7 and above
  • ONTAP 9 (formerly Clustered Data ONTAP)
  • ONTAP Antivirus Connector
  • OnCommand Insight
  • OnCommand Unified Manager Core Package
  • OnCommand Workflow Automation
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapCenter
  • SnapManager for Hyper-V
  • Storage Replication Adapter for Clustered Data ONTAP for VMware vSphere 9.7 and above
  • StorageGRID (formerly StorageGRID Webscale)
  • StorageGRID Baseboard Management Controller (BMC) - SG6060/SG6160/SGF6024/SGF6112/SG100/SG110/SG1000/SG1100
  • StorageGRID9 (9.x and prior)
  • System Manager 9.x
  • Virtual Storage Console for VMware vSphere 9.7 and above

Software Versions and Fixes

NetApp's currently available patches are listed below.


Product First Fixed in Release
NetApp SolidFire & HCI Management Node https://mysupport.netapp.com/site/products/all/details/element-software/downloads-tab/download/62654/12.0
https://mysupport.netapp.com/site/products/all/details/netapp-hci/downloads-tab/download/62542/1.8
NetApp Cloud Backup (formerly AltaVault) NetApp Cloud Backup (formerly AltaVault) has no plans to address this vulnerability. See the EOA announcement for more information.
NetApp SteelStore Cloud Integrated Storage NetApp SteelStore Cloud Integrated Storage has no plans to address this vulnerability. See the EOA announcement for more information.
ONTAP Select Deploy administration utility https://mysupport.netapp.com/site/products/all/details/ontapselect-deploy/downloads-tab/download/62910/9.7

CVE-2019-6109 and CVE-2019-6111 were fixed under bug 1212158. CVE-2019-6110 remains unfixed as the upstream maintainer has not fixed it. Exploit of CVE-2019-6110 requires a user to connect to a malicious SSH server or a MITM (Man-in-the-middle) of the scp connection.

Workarounds

None at this time.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/site/downloads/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20190213-0001

Revision History

Revision # Date Comments
1.0 20190213 Initial Public Release
2.0 20190423 Clustered Data ONTAP moved to Products Not Affected
3.0 20190731 Cluster Network Switch (NetApp CN1610) moved to Won't Fix status
4.0 20190926 NetApp Cloud Backup (formerly AltaVault), NetApp SteelStore Cloud Integrated Storage moved to Affected Products
5.0 20200402 Cluster Network Switch (NetApp CN1610) moved to Not Affected status since it ships a version of OpenSSH older than 7.9
6.0 20200818 NetApp SolidFire & HCI Management Node added to Software Versions and Fixes
7.0 20200901 NetApp SteelStore Cloud Integrated Storage moved to Won't Fix status
8.0 20210504 ONTAP Select Deploy administration utility moved to Won't Fix status
9.0 20220106 NetApp Cloud Backup (formerly AltaVault) moved to Won't Fix status, Final status
10.0 20240614 After additional review ONTAP Select Deploy administration utility added to Software Versions and Fixes with note regarding unfixed CVE, remains Final status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.