CVE-2013-4786 IPMI RAKP Vulnerability in NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20190919-0005 updates
Subscribe to NTAP-20190919-0005 advisory updates
Unsubscribe from NTAP-20190919-0005 advisory updates
Unsubscribe from NTAP-20190919-0005 advisory updates
Advisory ID: NTAP-20190919-0005 Version: 12.0 Last updated: 06/09/2023 Status: Final. CVEs: CVE-2013-4786
Summary
Multiple NetApp products incorporate the Intelligent Platform Management Interface (IPMI). The IPMI 2.0 specification supports RMCP+ Authenticated Key-Exchange Protocol (RAKP) authentication and is susceptible to a vulnerability which could lead to disclosure of sensitive information.
Impact
Successful exploitation of this vulnerability could lead to disclosure of sensitive information.
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2013-4786 | 7.5 (HIGH) | CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
Affected Products
- NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S
- NetApp HCI Baseboard Management Controller (BMC) - H410C
- NetApp HCI Baseboard Management Controller (BMC) - H610C
- NetApp HCI Baseboard Management Controller (BMC) - H610S
- NetApp HCI Baseboard Management Controller (BMC) - H615C
- NetApp SolidFire Baseboard Management Controller (BMC)
- StorageGRID Baseboard Management Controller (BMC)
Products Not Affected
- 7-Mode Transition Tool
- AFF Baseboard Management Controller (BMC) - A700s
- Active IQ Unified Manager for Linux
- Active IQ Unified Manager for Microsoft Windows
- Active IQ Unified Manager for VMware vSphere
- Active IQ mobile app
- Astra Trident
- Brocade Fabric Operating System Firmware
- Cloud Insights Storage Workload Security Agent
- E-Series SANtricity OS Controller Software 11.x
- E-Series SANtricity Unified Manager and Web Services Proxy
- Element HealthTools
- Element Plug-in for vCenter Server
- FAS/AFF BIOS - 8300/8700/A400/C400
- FAS/AFF Baseboard Management Controller (BMC) - A320/C190/A220/FAS2720/FAS2750/A800/C800/A150
- FAS/AFF Service Processor - 8080/8060/8040/8020
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- IOM6 SAS Disk Shelf Firmware
- MetroCluster Tiebreaker for clustered Data ONTAP
- NetApp BlueXP
- NetApp Cloud Backup OST Plug-in (formerly AltaVault OST Plug-in)
- NetApp Converged Systems Advisor Agent
- NetApp HCI Compute Node (Bootstrap OS)
- NetApp HCI Compute Node BIOS
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp ONTAP PowerShell Toolkit (PSTK)
- NetApp SolidFire & HCI Management Node
- NetApp SolidFire & HCI Storage Node (Element Software)
- NetApp SolidFire Plug-in for vRealize Orchestrator (SolidFire vRO)
- ONTAP 9 (formerly Clustered Data ONTAP)
- ONTAP Antivirus Connector
- ONTAP Select Deploy administration utility
- OnCommand Insight
- OnCommand Workflow Automation
- Single Mailbox Recovery
- Snap Creator Framework
- SnapCenter
- SnapCenter Plug-in for VMware vSphere
- SnapManager for Hyper-V
- SolidFire Storage Replication Adapter
- StorageGRID (formerly StorageGRID Webscale)
- System Manager 9.x
Software Versions and Fixes
NetApp's currently available patches are listed below.
Product | First Fixed in Release |
---|---|
NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S |
NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H410S has no plans to address this vulnerability. See the EOA announcement for more information. |
NetApp SolidFire Baseboard Management Controller (BMC) |
NetApp SolidFire Baseboard Management Controller (BMC) has no plans to address this vulnerability. See the EOA announcement for more information. |
StorageGRID Baseboard Management Controller (BMC) |
https://mysupport.netapp.com/site/products/all/details/storagegrid/downloads-tab/download/61023/11.7.0/ https://docs.netapp.com/us-en/storagegrid-117/harden/hardening-guidelines-for-storagegrid-nodes.html?q=%2Fprivate%2Fbmc#guidelines-for-hardware-appliance-nodes You can enable or disable remote IPMI access for all appliances containing a BMC by using the management API private endpoint, PUT /private/bmc. |
NetApp HCI Baseboard Management Controller (BMC) - H410C |
NetApp HCI Baseboard Management Controller (BMC) - H410C has no plans to address this vulnerability. See the EOA announcement for more information. |
NetApp HCI Baseboard Management Controller (BMC) - H610C |
NetApp HCI Baseboard Management Controller (BMC) - H610C has no plans to address this vulnerability. See the EOA announcement for more information. |
NetApp HCI Baseboard Management Controller (BMC) - H610S |
NetApp HCI Baseboard Management Controller (BMC) - H610S has no plans to address this vulnerability. See the EOA announcement for more information. |
NetApp HCI Baseboard Management Controller (BMC) - H615C |
NetApp HCI Baseboard Management Controller (BMC) - H615C has no plans to address this vulnerability. See the EOA announcement for more information. |
Workarounds
StorageGRID appliance Baseboard Management Controllers (BMC) should only be connected to secure and trusted networks. If no such network is available, access to the BMC can be prevented by physically disconnecting it from the network or by isolating IPMI traffic over UDP port 623.
NetApp HCI Baseboard Management Controller (BMC) - H610C, H615C, H610S and H410C should only be connected to secure and trusted networks to limit the access to BMC management interface. Alternately, utilizing strong cryptography and passwords will reduce the effectiveness of off-line dictionary attacks.
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20190919-0005
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20190919 | Initial Public Release |
2.0 | 20191001 | AFF Baseboard Management Controller (BMC) - A700s moved to Affected Products |
3.0 | 20191003 | StorageGRID Baseboard Management Controller (BMC) moved to Affected Products |
4.0 | 20191009 | AFF Baseboard Management Controller (BMC) - A700s moved to Products Not Affected |
5.0 | 20191021 | Updated Workaround for StorageGRID appliance Baseboard Management Controllers (BMC) |
6.0 | 20191029 | StorageGRID appliance Baseboard Management Controllers (BMC) moved to Won't Fix status |
7.0 | 20191030 | StorageGRID Baseboard Management Controller (BMC) moved to Won't Fix status |
8.0 | 20200225 | NetApp HCI Baseboard Management Controller (BMC) - H610C, NetApp HCI Baseboard Management Controller (BMC) - H610S and NetApp HCI Baseboard Management Controller (BMC) - H615C moved to Won't Fix status |
9.0 | 20200313 | NetApp HCI Baseboard Management Controller (BMC) - H410C moved to Won't Fix status |
10.0 | 20200814 | NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H300E/H500E/H700E/H410S moved to Won't Fix status |
11.0 | 20211101 | NetApp SolidFire Baseboard Management Controller (BMC) moved to Won't Fix status, Final status |
12.0 | 20230609 | NetApp SolidFire Baseboard Management Controller (BMC) added to Software Versions and Fixes |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.