<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Vulnerabilities in ONTAP Hardware</title>
    <link>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/145865#M9251</link>
    <description>&lt;P&gt;I know it's not obvious when looking at the specific page, but this text to the right of "&lt;STRONG&gt;Overview&lt;/STRONG&gt;" are additional tabs of information.&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Affected Products&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remediation&amp;nbsp;&amp;nbsp;&amp;nbsp; Revision History&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you click on &lt;STRONG&gt;Remediation&lt;/STRONG&gt;, you will see ONTAP 8.2.5 7-Mode has a fix.&lt;/P&gt;</description>
    <pubDate>Fri, 11 Jan 2019 17:51:29 GMT</pubDate>
    <dc:creator>andris</dc:creator>
    <dc:date>2019-01-11T17:51:29Z</dc:date>
    <item>
      <title>Vulnerabilities</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/145847#M9249</link>
      <description>&lt;P&gt;OpenSSH 7.4 Not Installed Multiple Vulnerabilities&lt;/P&gt;
&lt;P&gt;Device is a&amp;nbsp;FAS2240-2&lt;/P&gt;
&lt;P&gt;Version 8.2.5 7&lt;/P&gt;
&lt;P&gt;Is this system vulnerable. Many Linux systems run an older version of OpenSSH but they are patch to version 7.4.&lt;/P&gt;
&lt;P&gt;This is information is easy to find for many operating systems and appliacnes but NetApp seems to lack in&amp;nbsp;simple listings&amp;nbsp;of&amp;nbsp;vulnerability documentation and mitigations.&lt;/P&gt;
&lt;P&gt;Does NetApp do this.&lt;/P&gt;
&lt;P&gt;I found this link "&lt;A href="https://security.netapp.com/advisory/ntap-20171130-0002/" target="_blank"&gt;https://security.netapp.com/advisory/ntap-20171130-0002/&lt;/A&gt;" but it states nothing for mitigation. Like what version is fixed.&lt;/P&gt;
&lt;P&gt;Being that NetApp should be PCI compliant which means it must be patched for all Critical and High vulnerabilites I would hope it is or can be patched.&lt;/P&gt;
&lt;P&gt;Teh CVE's in question are&amp;nbsp;&amp;nbsp;CVE-2016-10012, CVE-2016-10011, CVE-2016-10010, CVE-2016-10009&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 12:58:07 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/145847#M9249</guid>
      <dc:creator>kdfosterjr</dc:creator>
      <dc:date>2025-06-04T12:58:07Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/145865#M9251</link>
      <description>&lt;P&gt;I know it's not obvious when looking at the specific page, but this text to the right of "&lt;STRONG&gt;Overview&lt;/STRONG&gt;" are additional tabs of information.&lt;/P&gt;
&lt;P&gt;&lt;FONT size="4"&gt;&lt;STRONG&gt;Affected Products&amp;nbsp;&amp;nbsp;&amp;nbsp;&amp;nbsp; Remediation&amp;nbsp;&amp;nbsp;&amp;nbsp; Revision History&lt;/STRONG&gt;&lt;/FONT&gt;&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;If you click on &lt;STRONG&gt;Remediation&lt;/STRONG&gt;, you will see ONTAP 8.2.5 7-Mode has a fix.&lt;/P&gt;</description>
      <pubDate>Fri, 11 Jan 2019 17:51:29 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/145865#M9251</guid>
      <dc:creator>andris</dc:creator>
      <dc:date>2019-01-11T17:51:29Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/149436#M9526</link>
      <description>&lt;P&gt;Andris, we have been looking a for a while regarding this same CVE. The notes all state that this has been fixed in newer releases on OnTap, but additional scans to the Netapp devices still show they are running OpenSSH 7.2. Was this fixed via a backport? If not, how was it fixed. If it is fixed with a backport, is there any official documentation stating this?&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 15:52:18 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/149436#M9526</guid>
      <dc:creator>Livewire18</dc:creator>
      <dc:date>2019-07-08T15:52:18Z</dc:date>
    </item>
    <item>
      <title>Re: Vulnerabilities</title>
      <link>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/149449#M9527</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;
&lt;P&gt;&amp;nbsp;&lt;/P&gt;
&lt;P&gt;It is not uncommon for third party to be patched rather than upgraded in ONTAP. Therefore scan results identified using detected third party software versions can often be incorrect. I am unaware of any ONTAP documentation that covers updating third party code versus patching it. As each security advisory states, they "should be considered the single source of current, up-to-date, authorized and accurate information from NetApp.". Advisory ntap-20171130-0002 covers CVE-2016-10012, CVE-2016-10011, CVE-2016-10010, and CVE-2016-10009 and it reflects that ONTAP 8.2.5 is the first fixed-in release for these CVEs.&lt;/P&gt;</description>
      <pubDate>Mon, 08 Jul 2019 20:58:47 GMT</pubDate>
      <guid>https://community.netapp.com/t5/ONTAP-Hardware/Vulnerabilities/m-p/149449#M9527</guid>
      <dc:creator>kryan</dc:creator>
      <dc:date>2019-07-08T20:58:47Z</dc:date>
    </item>
  </channel>
</rss>

