CVE-2024-21985 (GCVE-0-2024-21985)
Vulnerability from cvelistv5 – Published: 2024-01-26 16:01 – Updated: 2025-05-29 15:12
VLAI?
Summary
ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10
and 9.13.1P4 are susceptible to a vulnerability which could allow an
authenticated user with multiple remote accounts with differing roles to
perform actions via REST API beyond their intended privilege. Possible
actions include viewing limited configuration details and metrics or
modifying limited settings, some of which could result in a Denial of
Service (DoS).
Severity ?
7.6 (High)
CWE
- CWE-269 - Improper Privilege Management
Assigner
References
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-01T22:35:34.813Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_transferred"
],
"url": "https://security.netapp.com/advisory/ntap-20240126-0001/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2024-21985",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-05-08T19:09:09.334429Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2025-05-29T15:12:35.934Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"product": "ONTAP 9",
"vendor": "NetApp",
"versions": [
{
"lessThan": "9.9.1P18",
"status": "affected",
"version": "9.0",
"versionType": "patch"
},
{
"lessThan": "9.10.1P16",
"status": "affected",
"version": "9.10.1",
"versionType": "patch"
},
{
"lessThan": "9.11.1P13",
"status": "affected",
"version": "9.11.1",
"versionType": "patch"
},
{
"lessThan": "9.12.1P10",
"status": "affected",
"version": "9.12.1",
"versionType": "patch"
},
{
"lessThan": "9.13.1P4",
"status": "affected",
"version": "9.13.1",
"versionType": "patch"
}
]
}
],
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\n\u003cp\u003eONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \nand 9.13.1P4 are susceptible to a vulnerability which could allow an \nauthenticated user with multiple remote accounts with differing roles to\n perform actions via REST API beyond their intended privilege. Possible \nactions include viewing limited configuration details and metrics or \nmodifying limited settings, some of which could result in a Denial of \nService (DoS).\u003c/p\u003e\n\n"
}
],
"value": "ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \nand 9.13.1P4 are susceptible to a vulnerability which could allow an \nauthenticated user with multiple remote accounts with differing roles to\n perform actions via REST API beyond their intended privilege. Possible \nactions include viewing limited configuration details and metrics or \nmodifying limited settings, some of which could result in a Denial of \nService (DoS).\n\n\n\n"
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 7.6,
"baseSeverity": "HIGH",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "LOW",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-269",
"description": "CWE-269 Improper Privilege Management",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2024-01-26T16:01:48.168Z",
"orgId": "11fdca00-0482-4c88-a206-37f9c182c87d",
"shortName": "netapp"
},
"references": [
{
"url": "https://security.netapp.com/advisory/ntap-20240126-0001/"
}
],
"source": {
"advisory": "NTAP-20240126-0001",
"discovery": "UNKNOWN"
},
"title": "Privilege Escalation Vulnerability in ONTAP 9 ",
"x_generator": {
"engine": "Vulnogram 0.1.0-dev"
}
}
},
"cveMetadata": {
"assignerOrgId": "11fdca00-0482-4c88-a206-37f9c182c87d",
"assignerShortName": "netapp",
"cveId": "CVE-2024-21985",
"datePublished": "2024-01-26T16:01:48.168Z",
"dateReserved": "2024-01-03T19:45:25.346Z",
"dateUpdated": "2025-05-29T15:12:35.934Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.0\", \"versionEndExcluding\": \"9.9.1\", \"matchCriteriaId\": \"C1096408-669B-4944-A3C7-CDD8FB3215BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.10.0\", \"versionEndExcluding\": \"9.10.1\", \"matchCriteriaId\": \"D9AB5E20-70A4-412E-B0CE-8D56666D2FFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.11.0\", \"versionEndExcluding\": \"9.11.1\", \"matchCriteriaId\": \"002B4EC4-81D8-4449-A225-3137D37796E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.12.0\", \"versionEndExcluding\": \"9.12.1\", \"matchCriteriaId\": \"46A8E230-FCE4-44CA-9FEC-E4994970776E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.13.0\", \"versionEndExcluding\": \"9.13.1\", \"matchCriteriaId\": \"18E30F09-FA25-4B94-9372-5B5FFC4528C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0284DC1-9FAA-4979-82C3-AB7347614C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.10.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1A4278F-D9A9-4C39-AC53-AB35DB921E02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.11.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"366B49CA-EB3B-44A1-9DB4-9D24A0F427E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.12.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD223C45-CF1B-4931-9753-503923FCFE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.13.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E1CD626-B5E9-4166-A539-09305A5B9696\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \\nand 9.13.1P4 are susceptible to a vulnerability which could allow an \\nauthenticated user with multiple remote accounts with differing roles to\\n perform actions via REST API beyond their intended privilege. Possible \\nactions include viewing limited configuration details and metrics or \\nmodifying limited settings, some of which could result in a Denial of \\nService (DoS).\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Las versiones de ONTAP 9 anteriores a 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 y 9.13.1P4 son susceptibles a una vulnerabilidad que podr\\u00eda permitir a un usuario autenticado con m\\u00faltiples cuentas remotas con diferentes roles realizar acciones a trav\\u00e9s de la API REST m\\u00e1s all\\u00e1 de su privilegio pretendido. Las posibles acciones incluyen ver m\\u00e9tricas y detalles de configuraci\\u00f3n limitados o modificar configuraciones limitadas, algunas de las cuales podr\\u00edan resultar en una denegaci\\u00f3n de servicio (DoS).\"}]",
"id": "CVE-2024-21985",
"lastModified": "2024-11-21T08:55:19.830",
"metrics": "{\"cvssMetricV31\": [{\"source\": \"security-alert@netapp.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.7}]}",
"published": "2024-01-26T16:15:22.597",
"references": "[{\"url\": \"https://security.netapp.com/advisory/ntap-20240126-0001/\", \"source\": \"security-alert@netapp.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240126-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
"sourceIdentifier": "security-alert@netapp.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"security-alert@netapp.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2024-21985\",\"sourceIdentifier\":\"security-alert@netapp.com\",\"published\":\"2024-01-26T16:15:22.597\",\"lastModified\":\"2024-11-21T08:55:19.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \\nand 9.13.1P4 are susceptible to a vulnerability which could allow an \\nauthenticated user with multiple remote accounts with differing roles to\\n perform actions via REST API beyond their intended privilege. Possible \\nactions include viewing limited configuration details and metrics or \\nmodifying limited settings, some of which could result in a Denial of \\nService (DoS).\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Las versiones de ONTAP 9 anteriores a 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 y 9.13.1P4 son susceptibles a una vulnerabilidad que podr\u00eda permitir a un usuario autenticado con m\u00faltiples cuentas remotas con diferentes roles realizar acciones a trav\u00e9s de la API REST m\u00e1s all\u00e1 de su privilegio pretendido. Las posibles acciones incluyen ver m\u00e9tricas y detalles de configuraci\u00f3n limitados o modificar configuraciones limitadas, algunas de las cuales podr\u00edan resultar en una denegaci\u00f3n de servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@netapp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"security-alert@netapp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.9.1\",\"matchCriteriaId\":\"C1096408-669B-4944-A3C7-CDD8FB3215BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.10.0\",\"versionEndExcluding\":\"9.10.1\",\"matchCriteriaId\":\"D9AB5E20-70A4-412E-B0CE-8D56666D2FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.11.0\",\"versionEndExcluding\":\"9.11.1\",\"matchCriteriaId\":\"002B4EC4-81D8-4449-A225-3137D37796E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.12.0\",\"versionEndExcluding\":\"9.12.1\",\"matchCriteriaId\":\"46A8E230-FCE4-44CA-9FEC-E4994970776E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.13.0\",\"versionEndExcluding\":\"9.13.1\",\"matchCriteriaId\":\"18E30F09-FA25-4B94-9372-5B5FFC4528C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0284DC1-9FAA-4979-82C3-AB7347614C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.10.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A4278F-D9A9-4C39-AC53-AB35DB921E02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.11.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"366B49CA-EB3B-44A1-9DB4-9D24A0F427E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.12.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD223C45-CF1B-4931-9753-503923FCFE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.13.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E1CD626-B5E9-4166-A539-09305A5B9696\"}]}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20240126-0001/\",\"source\":\"security-alert@netapp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240126-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20240126-0001/\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-01T22:35:34.813Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-21985\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-05-08T19:09:09.334429Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-05-08T19:09:11.687Z\"}}], \"cna\": {\"title\": \"Privilege Escalation Vulnerability in ONTAP 9 \", \"source\": {\"advisory\": \"NTAP-20240126-0001\", \"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 7.6, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"HIGH\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"integrityImpact\": \"LOW\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"LOW\", \"confidentialityImpact\": \"LOW\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"NetApp\", \"product\": \"ONTAP 9\", \"versions\": [{\"status\": \"affected\", \"version\": \"9.0\", \"lessThan\": \"9.9.1P18\", \"versionType\": \"patch\"}, {\"status\": \"affected\", \"version\": \"9.10.1\", \"lessThan\": \"9.10.1P16\", \"versionType\": \"patch\"}, {\"status\": \"affected\", \"version\": \"9.11.1\", \"lessThan\": \"9.11.1P13\", \"versionType\": \"patch\"}, {\"status\": \"affected\", \"version\": \"9.12.1\", \"lessThan\": \"9.12.1P10\", \"versionType\": \"patch\"}, {\"status\": \"affected\", \"version\": \"9.13.1\", \"lessThan\": \"9.13.1P4\", \"versionType\": \"patch\"}], \"defaultStatus\": \"unaffected\"}], \"references\": [{\"url\": \"https://security.netapp.com/advisory/ntap-20240126-0001/\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \\nand 9.13.1P4 are susceptible to a vulnerability which could allow an \\nauthenticated user with multiple remote accounts with differing roles to\\n perform actions via REST API beyond their intended privilege. Possible \\nactions include viewing limited configuration details and metrics or \\nmodifying limited settings, some of which could result in a Denial of \\nService (DoS).\\n\\n\\n\\n\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\\n\u003cp\u003eONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \\nand 9.13.1P4 are susceptible to a vulnerability which could allow an \\nauthenticated user with multiple remote accounts with differing roles to\\n perform actions via REST API beyond their intended privilege. Possible \\nactions include viewing limited configuration details and metrics or \\nmodifying limited settings, some of which could result in a Denial of \\nService (DoS).\u003c/p\u003e\\n\\n\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-269\", \"description\": \"CWE-269 Improper Privilege Management\"}]}], \"providerMetadata\": {\"orgId\": \"11fdca00-0482-4c88-a206-37f9c182c87d\", \"shortName\": \"netapp\", \"dateUpdated\": \"2024-01-26T16:01:48.168Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2024-21985\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-05-29T15:12:35.934Z\", \"dateReserved\": \"2024-01-03T19:45:25.346Z\", \"assignerOrgId\": \"11fdca00-0482-4c88-a206-37f9c182c87d\", \"datePublished\": \"2024-01-26T16:01:48.168Z\", \"assignerShortName\": \"netapp\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…