Intel SA-00295 AMT Vulnerabilities in NetApp Products
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Subscribe to NTAP-20200611-0007 updates
Subscribe to NTAP-20200611-0007 advisory updates
Unsubscribe from NTAP-20200611-0007 advisory updates
Unsubscribe from NTAP-20200611-0007 advisory updates
Advisory ID: NTAP-20200611-0007 Version: 3.0 Last updated: 01/06/2022 Status: Final. CVEs: CVE-2020-0594, CVE-2020-0538, CVE-2020-0532, CVE-2020-0597, CVE-2020-0535, CVE-2020-0540, CVE-2020-0537, CVE-2020-8674, CVE-2020-0531, CVE-2020-0595, CVE-2020-0596
Summary
Multiple NetApp products incorporate Intel technology. Intel Active Management Technology versions prior to 11.8.77, 11.12.77, 11.22.77, 12.0.64, 13.0.32, 14.0.33 and 14.5.12 are susceptible to vulnerabilities which when successfully exploited could lead to escalation of privileges, information disclosure, or Denial of Service (DoS). Refer to the vendor advisory INTEL-SA-00295 for specific version details.
Impact
Successful exploitation of these vulnerabilities could lead to escalation of privileges, information disclosure, or Denial of Service (DoS).
For virtualized deployments, NetApp recommends working with your hypervisor and cloud platform vendors to ensure that your NetApp product is running on a secure and patched platform. For Docker-based deployments, NetApp recommends working with your operating system and hardware vendors to ensure that your NetApp product is running on a secure and patched platform.
Vulnerability Scoring Details
CVE | Score | Vector |
---|---|---|
CVE-2020-0531 | 6.5 (MEDIUM) | CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N |
CVE-2020-0532 | 7.1 (HIGH) | CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:H |
CVE-2020-0535 | 5.3 (MEDIUM) | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
CVE-2020-0537 | 4.9 (MEDIUM) | CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H |
CVE-2020-0538 | 7.5 (HIGH) | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H |
CVE-2020-0540 | 5.3 (MEDIUM) | CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:U/C:H/I:N/A:N |
CVE-2020-0594 | 9.8 (CRITICAL) | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE-2020-0595 | 9.8 (CRITICAL) | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H |
CVE-2020-0596 | 7.5 (HIGH) | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N |
CVE-2020-0597 | 6.5 (MEDIUM) | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:L |
CVE-2020-8674 | 4.3 (MEDIUM) | CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N |
Exploitation and Public Announcements
NetApp is aware of public discussion of this vulnerability.
References
Affected Products
- NetApp Cloud Backup (formerly AltaVault)
- NetApp SteelStore Cloud Integrated Storage
Products Not Affected
- 7-Mode Transition Tool
- AFF Baseboard Management Controller (BMC) - A700s
- ATTO FibreBridge - 6500N
- Active IQ Unified Manager for Linux
- Active IQ Unified Manager for Microsoft Windows
- Active IQ Unified Manager for VMware vSphere
- Active IQ mobile app
- Brocade Fabric Operating System Firmware
- Brocade SAN Navigator (SANnav)
- Cloud Insights Acquisition Unit
- Cloud Insights Telegraf Agent
- Cloud Manager
- Cloud Secure Agent
- Cloud Volumes ONTAP Mediator
- Clustered Data ONTAP
- Clustered Data ONTAP Antivirus Connector
- E-Series SANtricity OS Controller Software 11.x
- E-Series SANtricity Storage Manager
- E-Series SANtricity Web Services (REST API) for Web Services Proxy
- Element .NET SDK
- Element HealthTools
- Element JAVA SDK
- Element Plug-in for vCenter Server
- Element Python SDK
- FAS/AFF BIOS
- FAS/AFF Baseboard Management Controller (BMC) - 8300/8700/A400
- FAS/AFF Baseboard Management Controller (BMC) - A320/C190/A220/FAS2720/FAS2750/A800
- Host Utilities - SAN for Linux
- Host Utilities - SAN for Windows
- Inventory Collect Tool
- Management Services for Element Software and NetApp HCI
- MetroCluster Tiebreaker for clustered Data ONTAP
- NetApp Cloud Backup OST Plug-in (formerly AltaVault OST Plug-in)
- NetApp Converged Systems Advisor Agent
- NetApp E-Series Performance Analyzer
- NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H300E/H500E/H700E/H410S
- NetApp HCI Baseboard Management Controller (BMC) - H410C
- NetApp HCI Baseboard Management Controller (BMC) - H610C
- NetApp HCI Baseboard Management Controller (BMC) - H610S
- NetApp HCI Baseboard Management Controller (BMC) - H615C
- NetApp HCI Compute Node (Bootstrap OS)
- NetApp HCI Compute Node BIOS
- NetApp HCI Storage Node BIOS
- NetApp Manageability SDK
- NetApp NFS Plug-in for VMware VAAI
- NetApp SANtricity SMI-S Provider
- NetApp SMI-S Provider
- NetApp SolidFire & HCI Management Node
- NetApp SolidFire BIOS
- NetApp SolidFire Plug-in for vRealize Orchestrator (SolidFire vRO)
- NetApp SolidFire, Enterprise SDS & HCI Storage Node (Element Software)
- NetApp Storage Encryption
- NetApp XCP NFS
- NetApp XCP SMB
- ONTAP Mediator
- ONTAP Select Deploy administration utility
- OnCommand Insight
- OnCommand Workflow Automation
- Open Systems SnapVault Agent
- SANtricity Unified Manager
- SAS Firmware
- SRA Plugin for Linux
- SRA Plugin for Windows
- Service Processor
- Single Mailbox Recovery
- Snap Creator Framework
- SnapCenter
- SnapCenter Plug-in for VMware vSphere
- SnapDrive for Unix
- SnapManager for Exchange
- SnapManager for Hyper-V
- SnapManager for Oracle
- SnapManager for SAP
- SolidFire Storage Replication Adapter
- Storage Services Connector
- StorageGRID (formerly StorageGRID Webscale)
- StorageGRID Baseboard Management Controller (BMC)
- StorageGRID9 (9.x and prior)
- System Manager 9.x
- Trident
Software Versions and Fixes
NetApp's currently available patches are listed below.
Product | First Fixed in Release |
---|---|
NetApp SteelStore Cloud Integrated Storage |
NetApp SteelStore Cloud Integrated Storage has no plans to address this vulnerability. See the EOA announcement for more information. |
NetApp Cloud Backup (formerly AltaVault) |
NetApp Cloud Backup (formerly AltaVault) has no plans to address this vulnerability. See the EOA announcement for more information. |
Workarounds
None at this time.
Obtaining Software Fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
https://mysupport.netapp.com/site/downloads/
Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.
Contact Information
Check http://mysupport.netapp.com for further
updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)
Status of This Notice
Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20200611-0007
Revision History
Revision # | Date | Comments |
---|---|---|
1.0 | 20200611 | Initial Public Release |
2.0 | 20200901 | NetApp SteelStore Cloud Integrated Storage moved to Won't Fix status |
3.0 | 20220106 | NetApp Cloud Backup (formerly AltaVault) moved to Won't Fix status, Final status |
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2024 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.