<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: NetAPP Ontap and Bash Shellshock in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90577#M19320</link>
    <description>&lt;P&gt;It is not comprehensive.&amp;nbsp; I understand the attack vectors for the bash vulnerability as a whole.&amp;nbsp; I do not know the attack vectors that could impact a NetApp filer running ONTAP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a support case open as well.&amp;nbsp; I just posted here to maybe get more visibility because the support case isn't helping.&amp;nbsp; There are other vendors who use bash, but they have stated that their system is only vulnerable if you SSH into a device with credentials already, so the risk is low in that case becuase you would already need to have administrative credentials to login.&amp;nbsp; I don't know the risk with our NetApps.&amp;nbsp;&amp;nbsp; Are they vulnerable via the web interface without logging in?&amp;nbsp; Is there another vector that would work against them that wouldn't require authenticaiton?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not trying to figure out how to "break a netapp".&amp;nbsp; I'm trying to verify that our data, and our clients data is safe and not open to an unauthenticated attack.&amp;nbsp; We have clients of ours asking us if their data is safe, and we cannot answer them because NetApp won't answer us.&lt;/P&gt;</description>
    <pubDate>Thu, 02 Oct 2014 17:01:33 GMT</pubDate>
    <dc:creator>pmdfnetapp</dc:creator>
    <dc:date>2014-10-02T17:01:33Z</dc:date>
    <item>
      <title>NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89891#M19253</link>
      <description>&lt;P&gt;I have not been able to find any info on NetAPP products and the "new" Linux vulnerability Shellshock.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Any info would be appreciated in regards to NetAPP products.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 05 Jun 2025 05:28:15 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89891#M19253</guid>
      <dc:creator>FRANK_KEOUGH</dc:creator>
      <dc:date>2025-06-05T05:28:15Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89893#M19254</link>
      <description>&lt;P&gt;Hi Frank,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I found some links that I believe you would find useful.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;UL&gt;
&lt;LI&gt;&lt;SPAN style="line-height: 14px;"&gt;Here is the direct link to the information:&amp;nbsp;&lt;A href="https://library.netapp.com/ecm/ecm_get_file/ECMP1655016" target="_self"&gt;https://library.netapp.com/ecm/ecm_get_file/ECMP1655016&lt;/A&gt;&lt;/SPAN&gt;&lt;/LI&gt;
&lt;LI&gt;Here is the actual list of vulnerabilities: &lt;A href="http://mysupport.netapp.com/NOW/knowledge/docs/olio/scanner_results/" target="_blank"&gt;http://mysupport.netapp.com/NOW/knowledge/docs/olio/scanner_results/&lt;/A&gt;&lt;/LI&gt;
&lt;LI&gt;Here you'll find the process to stay informed:&lt;A href="http://www.netapp.com/us/legal/vulnerability-handling-response-policy.aspx" target="_blank"&gt;http://www.netapp.com/us/legal/vulnerability-handling-response-policy.aspx&lt;/A&gt;&lt;/LI&gt;
&lt;/UL&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I hope this helps you.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Thanks for using the NetApp Community!&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;-Alissa&lt;/P&gt;</description>
      <pubDate>Sun, 28 Sep 2014 21:26:23 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89893#M19254</guid>
      <dc:creator>alissa</dc:creator>
      <dc:date>2014-09-28T21:26:23Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89895#M19255</link>
      <description>&lt;P&gt;There are now scanners available to scan your network to see if any of your systems are vulnerable to the ShellShock Bash Bug.&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Regards,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;Nicholas Lee Fagan&lt;/P&gt;
&lt;P&gt;&lt;A href="https://twitter.com/OrlandoPCRepair" target="_self"&gt;https://twitter.com/OrlandoPCRepair&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Sun, 28 Sep 2014 04:45:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89895#M19255</guid>
      <dc:creator>nicholaf</dc:creator>
      <dc:date>2014-09-28T04:45:53Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89907#M19264</link>
      <description>&lt;P&gt;That did, thank you so much for your help.&lt;/P&gt;&lt;P&gt;and I signed up.&lt;/P&gt;</description>
      <pubDate>Sun, 28 Sep 2014 19:07:14 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/89907#M19264</guid>
      <dc:creator>FRANK_KEOUGH</dc:creator>
      <dc:date>2014-09-28T19:07:14Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90111#M19294</link>
      <description>&lt;P&gt;That advisory doesn't answer all of our questions.&amp;nbsp; It is unclear if our NetApp devices are remotely exploitable without authentication, OR is it only exploitable if you are able to SSH into the appliances?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Please update the advisory ASAP.&amp;nbsp; This is critical with customers who have confidential data stored on NetApp filers.&amp;nbsp; We already have a support case open and have escalated numerous times, but cannot seem to get to anyone who can provide a definitive answer.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you for your help.&lt;/P&gt;</description>
      <pubDate>Mon, 29 Sep 2014 19:10:38 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90111#M19294</guid>
      <dc:creator>pmdfnetapp</dc:creator>
      <dc:date>2014-09-29T19:10:38Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90519#M19313</link>
      <description>&lt;P&gt;&lt;SPAN&gt;Folks, you have to remember that when you access a FAS system via SSH you are connecting into ONTAP and not into a BASH shell. In order to get to the BASH shell a special account has to be 1) unlocked, 2) assigned a password, 3) enter a command to get to the login prompt and 4) then authenticated. I'm not saying that this puts the system in the clear; just saying that it takes some effort to get to the BASH shell of ONTAP.&lt;/SPAN&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:20:09 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90519#M19313</guid>
      <dc:creator>Andre_Clark</dc:creator>
      <dc:date>2014-10-02T13:20:09Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90521#M19314</link>
      <description>&lt;P&gt;NetApp needs to post that in&amp;nbsp;their official advisory, then.&amp;nbsp; As far as I know the Data ONTAP web interface could be vulnerable with unauthenticated users.&amp;nbsp; Other vendors have posted what the attack vector is.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;All I want is something similar to:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;STRONG&gt;Conditions:&lt;/STRONG&gt; A user must first successfully log in and authenticate via SSH to trigger this vulnerability.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Its been a week.&amp;nbsp; Tell us the attack vectors already so that we can tell OUR customers if their data is safe.&amp;nbsp; This is getting ridiculous.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:26:40 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90521#M19314</guid>
      <dc:creator>pmdfnetapp</dc:creator>
      <dc:date>2014-10-02T13:26:40Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90523#M19315</link>
      <description>&lt;P&gt;This was posted around it and is the official location to go for updates:&amp;nbsp;&lt;A target="_blank" href="https://library.netapp.com/ecm/ecm_get_file/ECMP1655016."&gt;https://library.netapp.com/ecm/ecm_get_file/ECMP1655016.&lt;/A&gt; &amp;nbsp;It was posted in an earlier response, not sure if you saw it.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:31:43 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90523#M19315</guid>
      <dc:creator>Andre_Clark</dc:creator>
      <dc:date>2014-10-02T13:31:43Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90527#M19316</link>
      <description>&lt;P&gt;I've seen it multiple times.&amp;nbsp; It does not answer the question of the attack vector.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:39:06 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90527#M19316</guid>
      <dc:creator>pmdfnetapp</dc:creator>
      <dc:date>2014-10-02T13:39:06Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90531#M19317</link>
      <description>&lt;P&gt;AFAIK, and I've been working with and deploying NetApp ONTAP solutions for a long time, there is no direct (remote) SSH access to the BASH shell. &amp;nbsp;As I mentioned earlier, you have to activiate an account to do so. &amp;nbsp;Could it be possible to do this via an API call or another method, I don't know but in order to do so, there has to be some type of authenticated access to the system in the first place. &amp;nbsp;This means a breach in a firewall for outside access, or, if within the firewall, still authenticated access to the system. &amp;nbsp;If bad security practices are being followed then, regardless of any programatic vulnerabilities, a system is exposed.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:48:55 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90531#M19317</guid>
      <dc:creator>Andre_Clark</dc:creator>
      <dc:date>2014-10-02T13:48:55Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90533#M19318</link>
      <description>&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;PMDF -&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;The full disclosure referenced above by NetApp is comprehensive.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Review of the NIST and CERT docs makes the various attack vectors clear.&lt;/P&gt;&lt;P&gt;They are too numerous to be spelled out in laymans terms in a more simplified manner.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;What were you looking for - A comprehensive list of step by step instructions on 'how to break a NetApp' ?&lt;/P&gt;&lt;P&gt;I'd guess you're not going to be getting from here on the communities ...&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;I hope this response has been helpful to you.&lt;BR /&gt;&lt;BR /&gt;At your service,&lt;BR /&gt;&lt;BR /&gt;Eugene E. Kashpureff, Sr.&lt;BR /&gt;Independent NetApp Consultant &lt;A target="_blank" href="http://www.linkedin.com/in/eugenekashpureff"&gt;http://www.linkedin.com/in/eugenekashpureff&lt;/A&gt;&lt;BR /&gt;Senior NetApp Instructor, IT Learning Solutions &lt;A target="_blank" href="http://sg.itls.asia/netapp"&gt;http://sg.itls.asia/netapp&lt;/A&gt;&lt;BR /&gt;(P.S. I appreciate 'kudos' on any helpful posts.)&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 13:58:53 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90533#M19318</guid>
      <dc:creator>ekashpureff</dc:creator>
      <dc:date>2014-10-02T13:58:53Z</dc:date>
    </item>
    <item>
      <title>Re: NetAPP Ontap and Bash Shellshock</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90577#M19320</link>
      <description>&lt;P&gt;It is not comprehensive.&amp;nbsp; I understand the attack vectors for the bash vulnerability as a whole.&amp;nbsp; I do not know the attack vectors that could impact a NetApp filer running ONTAP.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I have a support case open as well.&amp;nbsp; I just posted here to maybe get more visibility because the support case isn't helping.&amp;nbsp; There are other vendors who use bash, but they have stated that their system is only vulnerable if you SSH into a device with credentials already, so the risk is low in that case becuase you would already need to have administrative credentials to login.&amp;nbsp; I don't know the risk with our NetApps.&amp;nbsp;&amp;nbsp; Are they vulnerable via the web interface without logging in?&amp;nbsp; Is there another vector that would work against them that wouldn't require authenticaiton?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I'm not trying to figure out how to "break a netapp".&amp;nbsp; I'm trying to verify that our data, and our clients data is safe and not open to an unauthenticated attack.&amp;nbsp; We have clients of ours asking us if their data is safe, and we cannot answer them because NetApp won't answer us.&lt;/P&gt;</description>
      <pubDate>Thu, 02 Oct 2014 17:01:33 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/NetAPP-Ontap-and-Bash-Shellshock/m-p/90577#M19320</guid>
      <dc:creator>pmdfnetapp</dc:creator>
      <dc:date>2014-10-02T17:01:33Z</dc:date>
    </item>
  </channel>
</rss>

