<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Redis vulnerability against Classification VM in NetApp Console</title>
    <link>https://community.netapp.com/t5/NetApp-Console/Redis-vulnerability-against-Classification-VM/m-p/458096#M728</link>
    <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've deployed a private mode BlueXP Connector and Data Classification VMs to test the Data Classification product against one of our QA filers (sanqanascl100d). Our security team have run a Qualys scan against the Connector and Data Classification VMs. They have reported a redis vulnerability against the BlueXP Connector VM (hostname:sanadmbxp0001d) - specifically, "Redis Server Accessible Without Authentication detected on port 63791 over TCP". I've had a look at the containers running on the Connector VM and there's a Redis server running on a container called "ds_cc_charger_1".&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Pedrol_0-1738146177537.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/29857iEA4B56E98EFBA6B0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Pedrol_0-1738146177537.png" alt="Pedrol_0-1738146177537.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a redis server running in a container called&amp;nbsp;ds_cc_charger_1 running from an image called&amp;nbsp;&lt;A href="https://urldefense.com/v3/__http:/cloudmanagerinfra.azurecr.io/cc_charger_app_and_redis:darksite__;!!Nhn8V6BzJA!VSwnaBPjXaM7n8WUdFwroT9NQQhaZgxSSKkAM2YRMknpKggAyH2Af5moMj8Ez6N2Z8N3sq5AaFw9Zpr4mHDVbdvFq0U$" target="_blank"&gt;cloudmanagerinfra.azurecr.io/cc_charger_app_and_redis:darksite&lt;/A&gt; which is listening on port 63791:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Pedrol_1-1738146209068.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/29858iF65A0B0EB34C1F18/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Pedrol_1-1738146209068.png" alt="Pedrol_1-1738146209068.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the Qualys Vulnerability&amp;nbsp;Scanning tool that has picked this up.&lt;/P&gt;&lt;P&gt;I have to either get the reported vulnerability remediate or provide an explanation as to what the risk is and how big it is from a security point of view. It may require some kind of config change to be done on redis to alleviate this.&lt;/P&gt;&lt;P&gt;Support case&amp;nbsp;2010284575&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 29 Jan 2025 10:24:53 GMT</pubDate>
    <dc:creator>Pedrol</dc:creator>
    <dc:date>2025-01-29T10:24:53Z</dc:date>
    <item>
      <title>Redis vulnerability against Classification VM</title>
      <link>https://community.netapp.com/t5/NetApp-Console/Redis-vulnerability-against-Classification-VM/m-p/458096#M728</link>
      <description>&lt;P&gt;Hi team,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We've deployed a private mode BlueXP Connector and Data Classification VMs to test the Data Classification product against one of our QA filers (sanqanascl100d). Our security team have run a Qualys scan against the Connector and Data Classification VMs. They have reported a redis vulnerability against the BlueXP Connector VM (hostname:sanadmbxp0001d) - specifically, "Redis Server Accessible Without Authentication detected on port 63791 over TCP". I've had a look at the containers running on the Connector VM and there's a Redis server running on a container called "ds_cc_charger_1".&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Pedrol_0-1738146177537.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/29857iEA4B56E98EFBA6B0/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Pedrol_0-1738146177537.png" alt="Pedrol_0-1738146177537.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;There is a redis server running in a container called&amp;nbsp;ds_cc_charger_1 running from an image called&amp;nbsp;&lt;A href="https://urldefense.com/v3/__http:/cloudmanagerinfra.azurecr.io/cc_charger_app_and_redis:darksite__;!!Nhn8V6BzJA!VSwnaBPjXaM7n8WUdFwroT9NQQhaZgxSSKkAM2YRMknpKggAyH2Af5moMj8Ez6N2Z8N3sq5AaFw9Zpr4mHDVbdvFq0U$" target="_blank"&gt;cloudmanagerinfra.azurecr.io/cc_charger_app_and_redis:darksite&lt;/A&gt; which is listening on port 63791:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="Pedrol_1-1738146209068.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/29858iF65A0B0EB34C1F18/image-size/medium?v=v2&amp;amp;px=400" role="button" title="Pedrol_1-1738146209068.png" alt="Pedrol_1-1738146209068.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;the Qualys Vulnerability&amp;nbsp;Scanning tool that has picked this up.&lt;/P&gt;&lt;P&gt;I have to either get the reported vulnerability remediate or provide an explanation as to what the risk is and how big it is from a security point of view. It may require some kind of config change to be done on redis to alleviate this.&lt;/P&gt;&lt;P&gt;Support case&amp;nbsp;2010284575&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 29 Jan 2025 10:24:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/NetApp-Console/Redis-vulnerability-against-Classification-VM/m-p/458096#M728</guid>
      <dc:creator>Pedrol</dc:creator>
      <dc:date>2025-01-29T10:24:53Z</dc:date>
    </item>
    <item>
      <title>Re: Redis vulnerability against Classification VM</title>
      <link>https://community.netapp.com/t5/NetApp-Console/Redis-vulnerability-against-Classification-VM/m-p/458293#M730</link>
      <description>&lt;P&gt;Hello Pedro,&amp;nbsp;&lt;/P&gt;&lt;P&gt;I believe you have opened a BlueXP Service discussion instead of a Security KX discussion. Please search for "Security KX Discussion" in the search bar and open a new discussion to reach out to Ryan and Team for further assistance on the vulnerabilities observed in the BlueXP Connector. Also, please try to get the Qualys scanner report so that the same can be attached to the Security KX discussion that you will be opening.&amp;nbsp;&lt;BR /&gt;&lt;BR /&gt;Reference:&amp;nbsp;&lt;A href="https://community.netapp.com/t5/Security-KX-Discussions/bd-p/security-kx-discussions-and-documents" target="_blank"&gt;Security KX Discussions - NetApp Community&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Wed, 05 Feb 2025 11:21:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/NetApp-Console/Redis-vulnerability-against-Classification-VM/m-p/458293#M730</guid>
      <dc:creator>Adithya_Kameswaran</dc:creator>
      <dc:date>2025-02-05T11:21:37Z</dc:date>
    </item>
  </channel>
</rss>

