<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CVE-2022-38023 in ONTAP Discussions</title>
    <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445448#M42486</link>
    <description>&lt;P&gt;Like I said, read the link.&amp;nbsp;&lt;BR /&gt;it details everything including the versions it is fixed in. 9.7P22 being the lowest/oldest version of ONTAP&lt;/P&gt;</description>
    <pubDate>Thu, 22 Jun 2023 18:43:01 GMT</pubDate>
    <dc:creator>TMACMD</dc:creator>
    <dc:date>2023-06-22T18:43:01Z</dc:date>
    <item>
      <title>CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445443#M42482</link>
      <description>&lt;P&gt;Hi Guys,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have a FAS2650 which is on version NetApp Release 9.3P18.&amp;nbsp; We had planned to move away from this platform but unfortunately things have been slow.&amp;nbsp; What version of ONTAP will resolve CVE-2022-38023?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We have applied the workaround on MS Domain Controller's end but noting any patch after July 11 will remove the workaround.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thanks in advance,&lt;/P&gt;&lt;P&gt;TT&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 09:47:36 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445443#M42482</guid>
      <dc:creator>trackstar</dc:creator>
      <dc:date>2025-06-04T09:47:36Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445445#M42483</link>
      <description>&lt;P&gt;9.7P22 -is the lowest.&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&lt;A href="https://kb.netapp.com/Support_Bulletins/Customer_Bulletins/SU2" target="_blank"&gt;https://kb.netapp.com/Support_Bulletins/Customer_Bulletins/SU2&lt;/A&gt;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 18:22:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445445#M42483</guid>
      <dc:creator>SpindleNinja</dc:creator>
      <dc:date>2023-06-22T18:22:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445446#M42484</link>
      <description>&lt;P&gt;See the article&amp;nbsp;&lt;a href="https://community.netapp.com/t5/user/viewprofilepage/user-id/67570"&gt;@SpindleNinja&lt;/a&gt;&amp;nbsp; just posted.&amp;nbsp;&lt;BR /&gt;from what I recall, the oldest versions that are patched are ONTAP 9.7(get the latest P release) and forward. On any release, get the latest P release&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;that 2650 is capable of being updated to 9.11&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 18:33:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445446#M42484</guid>
      <dc:creator>TMACMD</dc:creator>
      <dc:date>2023-06-22T18:33:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445447#M42485</link>
      <description>&lt;P&gt;I just finished a support call.&amp;nbsp; They said 9.10.1 will fix the issue with the Microsoft CVE.&amp;nbsp; So 9.7 will also?&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 18:38:34 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445447#M42485</guid>
      <dc:creator>trackstar</dc:creator>
      <dc:date>2023-06-22T18:38:34Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445448#M42486</link>
      <description>&lt;P&gt;Like I said, read the link.&amp;nbsp;&lt;BR /&gt;it details everything including the versions it is fixed in. 9.7P22 being the lowest/oldest version of ONTAP&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 18:43:01 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445448#M42486</guid>
      <dc:creator>TMACMD</dc:creator>
      <dc:date>2023-06-22T18:43:01Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445449#M42487</link>
      <description>&lt;P&gt;Yeah, &amp;nbsp;sounds like they are just being proactive as 9.7 goes end of full term support in July this year. &amp;nbsp;&lt;/P&gt;
&lt;P&gt;9.7 - 31-Jul-2023. &amp;nbsp;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;I would go to 9.9.1 or 9.10.1 at a minimum. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 19:03:37 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445449#M42487</guid>
      <dc:creator>SpindleNinja</dc:creator>
      <dc:date>2023-06-22T19:03:37Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445490#M42491</link>
      <description>&lt;P&gt;Finally was able to view the docs and talked to the core team.&amp;nbsp; I am the original poster "trackstar".&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Core team said 9.7 fixed the issue (I also saw the docs).&amp;nbsp; I was told as long as we are in "Limited Support" we are ok.&amp;nbsp; Our hardware has an EOL next May.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Questions, on version 9.3 , I remember downloaded the non encryption of Ontap (without NetApp Volume Encryption).&amp;nbsp; If I were to download the encryption version this time, would I have any issues?&amp;nbsp; I am in the U.S.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Thank you.&lt;/P&gt;</description>
      <pubDate>Thu, 22 Jun 2023 21:57:27 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445490#M42491</guid>
      <dc:creator>SVHO</dc:creator>
      <dc:date>2023-06-22T21:57:27Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445494#M42492</link>
      <description>&lt;P&gt;The encrypted or not encrypted version of ONTAP is not in reference to protocol level encryption. It's in reference to encryption of the data being written to the storage.&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Most of our customers (in the US) will use the encryption version of ONTAP as that allows them to enable the data encryption features of ONTAP if they require it.&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 00:37:11 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445494#M42492</guid>
      <dc:creator>RossC</dc:creator>
      <dc:date>2023-06-23T00:37:11Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445495#M42493</link>
      <description>&lt;P&gt;If you are in the us, you should just down load the encryption capable version. The other is listed for countries that are not allowed to have the encryption on their systems&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 01:11:51 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445495#M42493</guid>
      <dc:creator>TMACMD</dc:creator>
      <dc:date>2023-06-23T01:11:51Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445503#M42494</link>
      <description>&lt;P&gt;Thank you guys.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;We had to set the the "RequireSeal:1" as a workaround after the June patch.&amp;nbsp; Lets say we patched ONTAP to 9.7+ next week, we don't have to do anything else on the NetApp's end?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://kb.netapp.com/onprem/ontap/da/NAS/Does_CVE-2022-38023_have_any_impact_to_ONTAP_9" target="_blank" rel="noopener"&gt;https://kb.netapp.com/onprem/ontap/da/NAS/Does_CVE-2022-38023_have_any_impact_to_ONTAP_9&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For the Microsoft DCs, we can do either?&lt;/P&gt;&lt;P&gt;1) We change the registry value to "RequireSeal:2" after applying the ONTAP next week and not wait til MS July's patches&lt;/P&gt;&lt;P&gt;or&lt;/P&gt;&lt;P&gt;2) Do nothing to the registry and wait til MS July's patch&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 04:47:12 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445503#M42494</guid>
      <dc:creator>SVHO</dc:creator>
      <dc:date>2023-06-23T04:47:12Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445510#M42499</link>
      <description>&lt;P&gt;If you patch both end, you should be good. &amp;nbsp; That's how we all read the KBs. &amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 11:54:16 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445510#M42499</guid>
      <dc:creator>SpindleNinja</dc:creator>
      <dc:date>2023-06-23T11:54:16Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445519#M42503</link>
      <description>&lt;P&gt;So running this command below, I see all of the connections using NTLMv2 (we disabled version v1 a long time ago).&amp;nbsp; This is expected right?&amp;nbsp; After both ends are patched, we will see only Kerberos?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vserver cifs session show -vserver xxx_svm1 -fields auth-mechanism,address,windows-user&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;vserver cifs security show -vserver xxx_svm1&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Vserver: xxx_svm1&lt;/P&gt;&lt;P&gt;Kerberos Clock Skew: 5 minutes&lt;BR /&gt;Kerberos Ticket Age: 10 hours&lt;BR /&gt;Kerberos Renewal Age: 7 days&lt;BR /&gt;Kerberos KDC Timeout: 3 seconds&lt;BR /&gt;Is Signing Required: false&lt;BR /&gt;Is Password Complexity Required: true&lt;BR /&gt;Use start_tls for AD LDAP connection: false&lt;BR /&gt;Is AES Encryption Enabled: false&lt;BR /&gt;LM Compatibility Level: ntlmv2-krb&lt;BR /&gt;Is SMB Encryption Required: false&lt;BR /&gt;Client Session Security: none&lt;BR /&gt;SMB1 Enabled for DC Connections: system-default&lt;BR /&gt;SMB2 Enabled for DC Connections: system-default&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Fri, 23 Jun 2023 18:01:44 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445519#M42503</guid>
      <dc:creator>SVHO</dc:creator>
      <dc:date>2023-06-23T18:01:44Z</dc:date>
    </item>
    <item>
      <title>Re: CVE-2022-38023</title>
      <link>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445590#M42520</link>
      <description>&lt;P&gt;Nevermind, MS just enforced the connection to be more secure, not getting rid of it the protocol.&lt;/P&gt;</description>
      <pubDate>Tue, 27 Jun 2023 00:22:45 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Discussions/CVE-2022-38023/m-p/445590#M42520</guid>
      <dc:creator>SVHO</dc:creator>
      <dc:date>2023-06-27T00:22:45Z</dc:date>
    </item>
  </channel>
</rss>

