January 2022 MySQL Server Vulnerabilities in NetApp Products

circle-info NetApp will continue to update this advisory as additional information becomes available.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

Summary

Multiple NetApp products incorporate Oracle MySQL. Certain MySQL versions are susceptible to multiple vulnerabilities that could lead to unauthorized takeover of MySQL Server, unauthorized read or modification access to a subset or all of the MySQL Server accessible data, or to cause a hang or frequently repeatable crash (partial or complete DoS) of MySQL Server. Refer to “Oracle Critical Patch Update Advisory - January 2022” for specific version details.

Impact

Successful exploitation of these vulnerabilities may lead to unauthorized takeover of MySQL Server, unauthorized read or modification access to a subset or all of the MySQL Server accessible data, or to a hang or frequently repeatable crash (partial or complete DoS) of MySQL Server.

Vulnerability Scoring Details

CVE Score Vector
CVE-2021-22946 7.5 (HIGH) CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2022-21245 4.3 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N
CVE-2022-21249 2.7 (LOW) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
CVE-2022-21253 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21254 5.3 (MEDIUM) CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21256 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21264 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21265 3.8 (LOW) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:L
CVE-2022-21270 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21278 7.1 (HIGH) CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-21279 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21280 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21284 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21285 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21286 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21287 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21288 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21289 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21290 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21297 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21301 5.5 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
CVE-2022-21302 5.3 (MEDIUM) CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21303 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21304 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21307 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21308 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21309 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21310 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21311 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21312 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21313 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21314 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21315 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21316 6.3 (MEDIUM) CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21317 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21318 6.3 (MEDIUM) CVSS:3.1/AV:L/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21319 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21320 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21321 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21322 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21323 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21324 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21325 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21326 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21327 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21328 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21329 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21330 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21331 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21332 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21333 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21334 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21335 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21336 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21337 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21339 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21342 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21344 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21348 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21351 7.1 (HIGH) CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H
CVE-2022-21352 5.9 (MEDIUM) CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:N/I:H/A:H
CVE-2022-21355 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21356 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H
CVE-2022-21357 2.9 (LOW) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:L/I:N/A:L
CVE-2022-21358 6.5 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21362 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21367 5.5 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
CVE-2022-21368 4.7 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:L/I:L/A:L
CVE-2022-21370 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21372 2.7 (LOW) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:L
CVE-2022-21374 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21378 5.5 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:L/A:H
CVE-2022-21379 4.9 (MEDIUM) CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:N/I:N/A:H
CVE-2022-21380 6.3 (MEDIUM) CVSS:3.1/AV:A/AC:H/PR:H/UI:R/S:U/C:H/I:H/A:H

Exploitation and Public Announcements

NetApp is aware of public discussion of this vulnerability.

References

Affected Products

  • Active IQ Unified Manager for Microsoft Windows
  • Active IQ Unified Manager for VMware vSphere
  • OnCommand Insight
  • OnCommand Workflow Automation
  • SnapCenter

Products Not Affected

  • 7-Mode Transition Tool
  • AFF Baseboard Management Controller (BMC) - A700s
  • AFF Baseboard Management Controller (BMC) - A900
  • ATTO FibreBridge - 6500N
  • ATTO FibreBridge - 7500N
  • ATTO FibreBridge - 7600N
  • Active IQ Unified Manager for Linux
  • Active IQ mobile app
  • Astra Control Center - NetApp Kubernetes Monitoring Operator
  • Astra Trident
  • BeeGFS CSI Driver
  • Brocade Fabric Operating System Firmware
  • Brocade SAN Navigator (SANnav)
  • Cloud Data Sense
  • Cloud Insights Acquisition Unit
  • Cloud Insights Telegraf Agent
  • Cloud Manager
  • Cloud Secure Agent
  • Cloud Volumes ONTAP Mediator
  • Clustered Data ONTAP
  • Clustered Data ONTAP Antivirus Connector
  • E-Series BIOS
  • E-Series SANtricity OS Controller Software 11.x
  • E-Series SANtricity Storage Manager
  • E-Series SANtricity Web Services (REST API) for Web Services Proxy
  • Element .NET SDK
  • Element HealthTools
  • Element JAVA SDK
  • Element Plug-in for vCenter Server
  • Element Powershell Tools
  • Element Python SDK
  • FAS/AFF BIOS
  • FAS/AFF Baseboard Management Controller (BMC) - 8300/8700/A400
  • FAS/AFF Baseboard Management Controller (BMC) - A250/500f
  • FAS/AFF Baseboard Management Controller (BMC) - A320/C190/A220/FAS2720/FAS2750/A800
  • Global File Cache
  • Host Utilities - SAN for Linux
  • Host Utilities - SAN for Windows
  • Inventory Collect Tool
  • Management Services for Element Software and NetApp HCI
  • MetroCluster Tiebreaker for clustered Data ONTAP
  • NetApp Cloud Backup OST Plug-in (formerly AltaVault OST Plug-in)
  • NetApp Converged Systems Advisor Agent
  • NetApp E-Series Performance Analyzer
  • NetApp HCI Baseboard Management Controller (BMC) - H300S/H500S/H700S/H300E/H500E/H700E/H410S
  • NetApp HCI Baseboard Management Controller (BMC) - H410C
  • NetApp HCI Baseboard Management Controller (BMC) - H610C
  • NetApp HCI Baseboard Management Controller (BMC) - H610S
  • NetApp HCI Baseboard Management Controller (BMC) - H615C
  • NetApp HCI Compute Node (Bootstrap OS)
  • NetApp HCI Compute Node BIOS
  • NetApp HCI Storage Node BIOS
  • NetApp Kubernetes Monitoring Operator
  • NetApp Manageability SDK
  • NetApp NFS Plug-in for VMware VAAI
  • NetApp SANtricity SMI-S Provider
  • NetApp SMI-S Provider
  • NetApp SolidFire & HCI Management Node
  • NetApp SolidFire BIOS
  • NetApp SolidFire Plug-in for vRealize Orchestrator (SolidFire vRO)
  • NetApp SolidFire, Enterprise SDS & HCI Storage Node (Element Software)
  • NetApp Storage Encryption
  • NetApp Virtual Desktop Service (VDS)
  • NetApp XCP NFS
  • NetApp XCP SMB
  • NextGen API
  • ONTAP Mediator
  • ONTAP Select Deploy administration utility
  • ONTAP Tools for VMware vSphere
  • Open Systems SnapVault Agent
  • SANtricity Storage Plugin for vCenter
  • SANtricity Unified Manager
  • SAS Firmware
  • SRA Plugin for Linux
  • SRA Plugin for Windows
  • Service Processor
  • Single Mailbox Recovery
  • Snap Creator Framework
  • SnapCenter Plug-in for VMware vSphere
  • SnapDrive for Unix
  • SnapManager for Hyper-V
  • SnapManager for Oracle
  • SnapManager for Oracle Windows
  • SnapManager for SAP
  • SolidFire Storage Replication Adapter
  • Storage Services Connector
  • StorageGRID (formerly StorageGRID Webscale)
  • StorageGRID BIOS SG1000/SG100
  • StorageGRID BIOS SG5660/SG5612/SG5760/SG5712
  • StorageGRID BIOS SG6060/SGF6024
  • StorageGRID Baseboard Management Controller (BMC)
  • System Manager 9.x

Software Versions and Fixes

None.

This section will be updated as patches are released.

Workarounds

Beginning with OnCommand Workflow Automation for Linux & Windows 4.2, OnCommand (Active IQ) Unified Manager for Linux & Windows 7.2 and SnapCenter Server 3.0, the MySQL software can be upgraded within documented constraints. Consult the product documentation for supported MySQL versions and other information related to the upgrade.

Beginning with OnCommand Insight versions 7.3.2 on Linux and 7.3.9 on Windows, the MySQL software can be upgraded after acquiring updated OnCommand Insight binaries via technical support.

Obtaining Software Fixes

Software fixes will be made available through the NetApp Support website in the Software Download section.

https://mysupport.netapp.com/site/downloads/

Customers who do not have access to the Support website should contact Technical Support at the number below to obtain the patches.

Contact Information

Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (Asia/Pacific)

Status of This Notice

Interim.

NetApp will continue to update this advisory as additional information becomes available.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

This advisory is posted at the following link:
https://security.netapp.com/advisory/NTAP-20220121-0008

Revision History

Revision # Date Comments
1.0 20220121 Initial Public Release
2.0 20220125 SnapCenter moved to Affected Products, and StorageGRID (formerly StorageGRID Webscale) moved to Products Not Affected
3.0 20220131 SnapCenter Plug-in for VMware vSphere moved to Products Not Affected
4.0 20220307 Workarounds text updated
5.0 20220315 Active IQ Unified Manager for Microsoft Windows, and Active IQ Unified Manager for VMware vSphere moved to Affected Products

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by NetApp, and the methodology and assumptions used by NetApp. NetApp is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.