What are you looking for ?
Advertise with us
RAIDON

NetApp: Two Final Status Security Advisories Concerning SnapCenter

CVE-2023-27313 privilege escalation vulnerability in SnapCenter, and CVE-2023-27312 privilege escalation vulnerability in SnapCenter plugin for VMware vSphere

NetApp, Inc. has published 2 security advisories concerning privilege escalation vulnerability in SnapCenter and privilege escalation vulnerability in SnapCenter plugin for VMware vSphere.

CVE-2023-27313 Privilege Escalation Vulnerability in SnapCenter
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.

Advisory ID: NTAP-20230713-0002
Version: 1.0
Last updated: 07/13/2023
Status: Final.
CVEs: CVE-2023-27313

Summary
SnapCenter versions 3.x and 4.x prior to 4.9 are susceptible to a vulnerability which may allow an authenticated unprivileged user to gain access as an admin user.

Impact
Successful exploitation of this vulnerability may allow an authenticated unprivileged user to escalate their privileges.

Vulnerability scoring details :

CVE

Score

Vector

CVE-2023-27313

8.3 (HIGH)

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H

Exploitation and public announcements
NetApp is not aware of public discussion regarding this vulnerability.

Acknowledgements
This issue was found as part of an internal security audit by the company.

Affected products

  • SnapCenter

Remediation
Software versions and fixes
Firm’s currently available patches are listed below.

Workarounds : None at this time.

Obtaining software fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.

Customers who do not have access to the support website should contact technical support at the number below to obtain the patches.

Contact information: Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (AsiaPac)

Revision history status of this notice : Final

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding full support products and versions.This advisory is posted at this link.

Revision History

Revision #

Date

Comments

1.0

20230713

Initial public release, final status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by the vendor, and the methodology and assumptions used by NetApp. The company is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.

CVE-2023-27312 Privilege Escalation Vulnerability in SnapCenter Plugin for VMware vSphere
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding full support products and versions.

Advisory ID: NTAP-20230713-0001
Version: 1.0
Last updated: 07/13/2023
Status: Final.
CVEs: CVE-2023-27312

Summary
SnapCenter Plugin for VMware vSphere versions 4.6 prior to 4.9 are susceptible to a vulnerability which may allow authenticated unprivileged users to modify email and snapshot name settings within the VMware vSphere user interface.

Impact
Successful exploitation of this vulnerability may allow an unprivileged authenticated user to escalate their privileges to modify settings.

Vulnerability scoring details

CVE

Score

Vector

CVE-2023-27312

5.4 (MEDIUM)

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N

Exploitation and public announcements
The company is aware of public discussion of this vulnerability.

Acknowledgements
It would like to thank Oded Weissman from Madsec Security Ltd for reporting this vulnerability in SnapCenter Plugin for VMware vSphere.

Affected Products

  • SnapCenter Plug-in for VMware vSphere

Remediation: Software versions and fixes
Firm’s currently available patches are listed below.

Product

First fixed in release

SnapCenter Plug-in for VMware vSphere

https://mysupport.netapp.com/site/products/all/details/scv/downloads-tab/download/63240/4.9

Workarounds : None at this time.

Obtaining Software Fixes
Software fixes will be made available through the NetApp support website in the Software Download section.

Customers who do not have access to the support website should contact technical support at the number below to obtain the patches.

Contact Information: Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:

Technical support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (AsiaPac)

Revision history:
Status of this notice :
Final.

This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding full support products and versions.

This advisory is posted at this link

Revision history

Revision #

Date

Comments

1.0

20230713

Initial public release, final status

This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by the vendor, and the methodology and assumptions used by NetApp. The company is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.

Articles_bottom
ExaGrid
AIC
ATTOtarget="_blank"
OPEN-E