NetApp: Two Final Status Security Advisories Concerning SnapCenter
CVE-2023-27313 privilege escalation vulnerability in SnapCenter, and CVE-2023-27312 privilege escalation vulnerability in SnapCenter plugin for VMware vSphere
This is a Press Release edited by StorageNewsletter.com on July 25, 2023 at 2:01 pmNetApp, Inc. has published 2 security advisories concerning privilege escalation vulnerability in SnapCenter and privilege escalation vulnerability in SnapCenter plugin for VMware vSphere.
CVE-2023-27313 Privilege Escalation Vulnerability in SnapCenter
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding Full Support products and versions.
Advisory ID: NTAP-20230713-0002
Version: 1.0
Last updated: 07/13/2023
Status: Final.
CVEs: CVE-2023-27313
Summary
SnapCenter versions 3.x and 4.x prior to 4.9 are susceptible to a vulnerability which may allow an authenticated unprivileged user to gain access as an admin user.
Impact
Successful exploitation of this vulnerability may allow an authenticated unprivileged user to escalate their privileges.
Vulnerability scoring details :
-
CVE
Score
Vector
8.3 (HIGH)
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:H/A:H
Exploitation and public announcements
NetApp is not aware of public discussion regarding this vulnerability.
Acknowledgements
This issue was found as part of an internal security audit by the company.
Affected products
- SnapCenter
Remediation
Software versions and fixes
Firm’s currently available patches are listed below.
-
Product
First Fixed in Release
SnapCenter
https://mysupport.netapp.com/site/products/all/details/snapcenter/downloads-tab/download/62018/4.9
Workarounds : None at this time.
Obtaining software fixes
Software fixes will be made available through the NetApp Support website in the Software Download section.
Customers who do not have access to the support website should contact technical support at the number below to obtain the patches.
Contact information: Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:
Technical Support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (AsiaPac)
Revision history status of this notice : Final
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding full support products and versions.This advisory is posted at this link.
Revision History
-
Revision #
Date
Comments
1.0
20230713
Initial public release, final status
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by the vendor, and the methodology and assumptions used by NetApp. The company is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.
CVE-2023-27312 Privilege Escalation Vulnerability in SnapCenter Plugin for VMware vSphere
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding full support products and versions.
Advisory ID: NTAP-20230713-0001
Version: 1.0
Last updated: 07/13/2023
Status: Final.
CVEs: CVE-2023-27312
Summary
SnapCenter Plugin for VMware vSphere versions 4.6 prior to 4.9 are susceptible to a vulnerability which may allow authenticated unprivileged users to modify email and snapshot name settings within the VMware vSphere user interface.
Impact
Successful exploitation of this vulnerability may allow an unprivileged authenticated user to escalate their privileges to modify settings.
Vulnerability scoring details
-
CVE
Score
Vector
5.4 (MEDIUM)
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:N
Exploitation and public announcements
The company is aware of public discussion of this vulnerability.
Acknowledgements
It would like to thank Oded Weissman from Madsec Security Ltd for reporting this vulnerability in SnapCenter Plugin for VMware vSphere.
Affected Products
- SnapCenter Plug-in for VMware vSphere
Remediation: Software versions and fixes
Firm’s currently available patches are listed below.
-
Product
First fixed in release
SnapCenter Plug-in for VMware vSphere
https://mysupport.netapp.com/site/products/all/details/scv/downloads-tab/download/63240/4.9
Workarounds : None at this time.
Obtaining Software Fixes
Software fixes will be made available through the NetApp support website in the Software Download section.
Customers who do not have access to the support website should contact technical support at the number below to obtain the patches.
Contact Information: Check http://mysupport.netapp.com for further updates.
For questions, contact NetApp at:
Technical support
mysupport.netapp.com
1 888 4 NETAPP (1 888 463 8277) (U.S. and Canada)
+00 800 44 638277 (EMEA/Europe)
+800 800 80 800 (AsiaPac)
Revision history:
Status of this notice : Final.
This advisory should be considered the single source of current, up-to-date, authorized and accurate information from NetApp regarding full support products and versions.
This advisory is posted at this link
Revision history
-
Revision #
Date
Comments
1.0
20230713
Initial public release, final status
This document is provided solely for informational purposes. All information is based upon NetApp’s current knowledge and understanding of the hardware and software products tested by the vendor, and the methodology and assumptions used by NetApp. The company is not responsible for any errors or omissions that may be contained herein, and no warranty, representation, or other legal commitment or obligation is being provided by NetApp. © 2022 NetApp, Inc. All rights reserved. No portions of this document may be reproduced without prior written consent of NetApp, Inc.