<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: HCI vulnerability in SolidFire and HCI</title>
    <link>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166461#M146</link>
    <description>&lt;P&gt;Oftentimes such scans are just "security spam" and report all sorts of things. Many a time it's completely irrelevant to our use case because we don't run eCommerce portals but API services for admins and vCenter/K8s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, let's take a look at the first two CVEs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;CVE-2019-11068 -&amp;nbsp;libxslt - I don't see how any of that applies to NetApp HCI or SF environments. "xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded". Users are administrators. If someone could show me how one admin with limited permissions can become another admin, I'd be interested. Otherwise, I don't see how this matters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) CVE-2019-14287 - sudo vulnerability. First, there are no users on mNode (or SolidFire nodes) except admins, so there's no harm in a sudoer becoming root. Second, the vulnerability - as per example exploit in the&amp;nbsp; CVE - doesn't do anything (see below). Third, you can become root by simply switching to root - the only user there is (admin) is &lt;EM&gt;supposed&lt;/EM&gt; to be able to become root.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="elementx_1-1619850463566.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/11353i833086C19660597A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="elementx_1-1619850463566.png" alt="elementx_1-1619850463566.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, you can limit IP access and NetApp HCI at least recommends to put mNode on a Management VLAN when deploying, so that only admins can access mNode in the first place. If your Mgmt node was on own LAN, exposed only to selected admins and vCenter, for example, it wouldn't get scanned in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="elementx_2-1619851242186.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/11354i580A742C9431EC28/image-size/medium?v=v2&amp;amp;px=400" role="button" title="elementx_2-1619851242186.png" alt="elementx_2-1619851242186.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But many users don't do that because it's "inconvenient", so vCenter, SolidFire MIP(s) and mNode MIP are all made accessible to VM Network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you haven't done that, you can move mNode to another network, although that may not be possible without reinstalling it (or reconfiguring, but there are no KBs for that as far as I know), or use other approaches such as iptables on mNode.&lt;/P&gt;&lt;P&gt;Because of Docker, there's a lot of rules already configured, so you'd have to be careful to just add additional rules that drop access to HCC/mNode management IP/port to all, and allow it to IPs that need access (which could be a handful, depending who and what needs access to that IP). These rules may need to be redeployed after mNode VM is redeployed or upgraded.&lt;/P&gt;&lt;P&gt;Another way is to install a secure proxy and allow access to mNode only to that proxy IP, and deal with access control on the proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;mnode ~ # iptables -L&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Chain INPUT (policy DROP)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;target prot opt source destination &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-before-logging-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-before-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-after-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-after-logging-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-reject-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-track-input all -- anywhere anywhere&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;Chain FORWARD (policy DROP)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;target prot opt source destination &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER-USER all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER-INGRESS all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER-ISOLATION-STAGE-1 all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[...]&lt;/FONT&gt;&lt;/P&gt;</description>
    <pubDate>Sat, 01 May 2021 06:49:49 GMT</pubDate>
    <dc:creator>elementx</dc:creator>
    <dc:date>2021-05-01T06:49:49Z</dc:date>
    <item>
      <title>HCI vulnerability</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166380#M144</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;After use Nessus scan HCI 1.8P1 and discover below&amp;nbsp;vulnerability, but the "Remediation" did not mention fix the issue. Could HCI 1.9 fix below&amp;nbsp;vulnerability? If did not patch fix, could management node setup firewall ACL allow dedicate hosts access?&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://security.netapp.com/advisory/ntap-20191017-0001/" target="_blank"&gt;https://security.netapp.com/advisory/ntap-20191017-0001/&lt;/A&gt;&lt;BR /&gt;CVE-2019-11068&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://security.netapp.com/advisory/" target="_blank"&gt;https://security.netapp.com/advisory/&lt;/A&gt;&lt;BR /&gt;CVE-2019-14287&lt;/P&gt;&lt;P&gt;CVE-2020-10029&lt;/P&gt;&lt;P&gt;CVE-2020-26116&lt;/P&gt;&lt;P&gt;CVE-2021-3156&lt;/P&gt;&lt;P&gt;CVE-2019-5094&lt;/P&gt;&lt;P&gt;CVE-2020-13817&lt;/P&gt;&lt;P&gt;CVE-2020-15025&lt;/P&gt;&lt;P&gt;CVE-2020-1971&lt;/P&gt;&lt;P&gt;CVE-2020-1752&lt;/P&gt;&lt;P&gt;CVE-2021-3156&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Best regards,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Chung&lt;/P&gt;</description>
      <pubDate>Wed, 04 Jun 2025 10:26:42 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166380#M144</guid>
      <dc:creator>chinchillaking</dc:creator>
      <dc:date>2025-06-04T10:26:42Z</dc:date>
    </item>
    <item>
      <title>Re: HCI vulnerability</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166398#M145</link>
      <description>&lt;P&gt;Hello,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Mitigations (fixes or workarounds) are expected for all affected Full Support products. Advisories are updated with first fixed releases when they become available for use.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;I am unsure if it is possible to configure the firewall on the management node - I'd recommend a support case to confirm.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 28 Apr 2021 18:51:56 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166398#M145</guid>
      <dc:creator>kryan</dc:creator>
      <dc:date>2021-04-28T18:51:56Z</dc:date>
    </item>
    <item>
      <title>Re: HCI vulnerability</title>
      <link>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166461#M146</link>
      <description>&lt;P&gt;Oftentimes such scans are just "security spam" and report all sorts of things. Many a time it's completely irrelevant to our use case because we don't run eCommerce portals but API services for admins and vCenter/K8s.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;For example, let's take a look at the first two CVEs:&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;1)&amp;nbsp;CVE-2019-11068 -&amp;nbsp;libxslt - I don't see how any of that applies to NetApp HCI or SF environments. "xsltCheckRead can return -1 for a crafted URL that is not actually invalid and is subsequently loaded". Users are administrators. If someone could show me how one admin with limited permissions can become another admin, I'd be interested. Otherwise, I don't see how this matters.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;2) CVE-2019-14287 - sudo vulnerability. First, there are no users on mNode (or SolidFire nodes) except admins, so there's no harm in a sudoer becoming root. Second, the vulnerability - as per example exploit in the&amp;nbsp; CVE - doesn't do anything (see below). Third, you can become root by simply switching to root - the only user there is (admin) is &lt;EM&gt;supposed&lt;/EM&gt; to be able to become root.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="elementx_1-1619850463566.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/11353i833086C19660597A/image-size/medium?v=v2&amp;amp;px=400" role="button" title="elementx_1-1619850463566.png" alt="elementx_1-1619850463566.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Yes, you can limit IP access and NetApp HCI at least recommends to put mNode on a Management VLAN when deploying, so that only admins can access mNode in the first place. If your Mgmt node was on own LAN, exposed only to selected admins and vCenter, for example, it wouldn't get scanned in the first place.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;span class="lia-inline-image-display-wrapper lia-image-align-inline" image-alt="elementx_2-1619851242186.png" style="width: 400px;"&gt;&lt;img src="https://community.netapp.com/t5/image/serverpage/image-id/11354i580A742C9431EC28/image-size/medium?v=v2&amp;amp;px=400" role="button" title="elementx_2-1619851242186.png" alt="elementx_2-1619851242186.png" /&gt;&lt;/span&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;But many users don't do that because it's "inconvenient", so vCenter, SolidFire MIP(s) and mNode MIP are all made accessible to VM Network.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;If you haven't done that, you can move mNode to another network, although that may not be possible without reinstalling it (or reconfiguring, but there are no KBs for that as far as I know), or use other approaches such as iptables on mNode.&lt;/P&gt;&lt;P&gt;Because of Docker, there's a lot of rules already configured, so you'd have to be careful to just add additional rules that drop access to HCC/mNode management IP/port to all, and allow it to IPs that need access (which could be a handful, depending who and what needs access to that IP). These rules may need to be redeployed after mNode VM is redeployed or upgraded.&lt;/P&gt;&lt;P&gt;Another way is to install a secure proxy and allow access to mNode only to that proxy IP, and deal with access control on the proxy.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;mnode ~ # iptables -L&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;Chain INPUT (policy DROP)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;target prot opt source destination &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-before-logging-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-before-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-after-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-after-logging-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-reject-input all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ufw-track-input all -- anywhere anywhere&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;Chain FORWARD (policy DROP)&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;target prot opt source destination &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER-USER all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER-INGRESS all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER-ISOLATION-STAGE-1 all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere ctstate RELATED,ESTABLISHED&lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;DOCKER all -- anywhere anywhere &lt;/FONT&gt;&lt;BR /&gt;&lt;FONT face="courier new,courier"&gt;ACCEPT all -- anywhere anywhere&lt;/FONT&gt;&lt;/P&gt;&lt;P&gt;&lt;FONT face="courier new,courier"&gt;[...]&lt;/FONT&gt;&lt;/P&gt;</description>
      <pubDate>Sat, 01 May 2021 06:49:49 GMT</pubDate>
      <guid>https://community.netapp.com/t5/SolidFire-and-HCI/HCI-vulnerability/m-p/166461#M146</guid>
      <dc:creator>elementx</dc:creator>
      <dc:date>2021-05-01T06:49:49Z</dc:date>
    </item>
  </channel>
</rss>

