cve-2024-21985
Vulnerability from cvelistv5
Published
2024-01-26 16:01
Modified
2024-08-01 22:35
Summary
ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 and 9.13.1P4 are susceptible to a vulnerability which could allow an authenticated user with multiple remote accounts with differing roles to perform actions via REST API beyond their intended privilege. Possible actions include viewing limited configuration details and metrics or modifying limited settings, some of which could result in a Denial of Service (DoS).
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T22:35:34.813Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://security.netapp.com/advisory/ntap-20240126-0001/"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "product": "ONTAP 9",
          "vendor": "NetApp",
          "versions": [
            {
              "lessThan": "9.9.1P18",
              "status": "affected",
              "version": "9.0",
              "versionType": "patch"
            },
            {
              "lessThan": "9.10.1P16",
              "status": "affected",
              "version": "9.10.1",
              "versionType": "patch"
            },
            {
              "lessThan": "9.11.1P13",
              "status": "affected",
              "version": "9.11.1",
              "versionType": "patch"
            },
            {
              "lessThan": "9.12.1P10",
              "status": "affected",
              "version": "9.12.1",
              "versionType": "patch"
            },
            {
              "lessThan": "9.13.1P4",
              "status": "affected",
              "version": "9.13.1",
              "versionType": "patch"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "\n\u003cp\u003eONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \nand 9.13.1P4 are susceptible to a vulnerability which could allow an \nauthenticated user with multiple remote accounts with differing roles to\n perform actions via REST API beyond their intended privilege. Possible \nactions include viewing limited configuration details and metrics or \nmodifying limited settings, some of which could result in a Denial of \nService (DoS).\u003c/p\u003e\n\n"
            }
          ],
          "value": "ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \nand 9.13.1P4 are susceptible to a vulnerability which could allow an \nauthenticated user with multiple remote accounts with differing roles to\n perform actions via REST API beyond their intended privilege. Possible \nactions include viewing limited configuration details and metrics or \nmodifying limited settings, some of which could result in a Denial of \nService (DoS).\n\n\n\n"
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 7.6,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "LOW",
            "integrityImpact": "LOW",
            "privilegesRequired": "LOW",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-269",
              "description": "CWE-269 Improper Privilege Management",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-01-26T16:01:48.168Z",
        "orgId": "11fdca00-0482-4c88-a206-37f9c182c87d",
        "shortName": "netapp"
      },
      "references": [
        {
          "url": "https://security.netapp.com/advisory/ntap-20240126-0001/"
        }
      ],
      "source": {
        "advisory": "NTAP-20240126-0001",
        "discovery": "UNKNOWN"
      },
      "title": "Privilege Escalation Vulnerability in ONTAP 9 ",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "11fdca00-0482-4c88-a206-37f9c182c87d",
    "assignerShortName": "netapp",
    "cveId": "CVE-2024-21985",
    "datePublished": "2024-01-26T16:01:48.168Z",
    "dateReserved": "2024-01-03T19:45:25.346Z",
    "dateUpdated": "2024-08-01T22:35:34.813Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "fkie_nvd": {
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.0\", \"versionEndExcluding\": \"9.9.1\", \"matchCriteriaId\": \"C1096408-669B-4944-A3C7-CDD8FB3215BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.10.0\", \"versionEndExcluding\": \"9.10.1\", \"matchCriteriaId\": \"D9AB5E20-70A4-412E-B0CE-8D56666D2FFA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.11.0\", \"versionEndExcluding\": \"9.11.1\", \"matchCriteriaId\": \"002B4EC4-81D8-4449-A225-3137D37796E0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.12.0\", \"versionEndExcluding\": \"9.12.1\", \"matchCriteriaId\": \"46A8E230-FCE4-44CA-9FEC-E4994970776E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"9.13.0\", \"versionEndExcluding\": \"9.13.1\", \"matchCriteriaId\": \"18E30F09-FA25-4B94-9372-5B5FFC4528C4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"E0284DC1-9FAA-4979-82C3-AB7347614C80\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.10.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1A4278F-D9A9-4C39-AC53-AB35DB921E02\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.11.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"366B49CA-EB3B-44A1-9DB4-9D24A0F427E5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.12.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"DD223C45-CF1B-4931-9753-503923FCFE25\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:netapp:clustered_data_ontap:9.13.1:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E1CD626-B5E9-4166-A539-09305A5B9696\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \\nand 9.13.1P4 are susceptible to a vulnerability which could allow an \\nauthenticated user with multiple remote accounts with differing roles to\\n perform actions via REST API beyond their intended privilege. Possible \\nactions include viewing limited configuration details and metrics or \\nmodifying limited settings, some of which could result in a Denial of \\nService (DoS).\\n\\n\\n\\n\"}, {\"lang\": \"es\", \"value\": \"Las versiones de ONTAP 9 anteriores a 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 y 9.13.1P4 son susceptibles a una vulnerabilidad que podr\\u00eda permitir a un usuario autenticado con m\\u00faltiples cuentas remotas con diferentes roles realizar acciones a trav\\u00e9s de la API REST m\\u00e1s all\\u00e1 de su privilegio pretendido. Las posibles acciones incluyen ver m\\u00e9tricas y detalles de configuraci\\u00f3n limitados o modificar configuraciones limitadas, algunas de las cuales podr\\u00edan resultar en una denegaci\\u00f3n de servicio (DoS).\"}]",
      "id": "CVE-2024-21985",
      "lastModified": "2024-11-21T08:55:19.830",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security-alert@netapp.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.7}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\", \"baseScore\": 7.6, \"baseSeverity\": \"HIGH\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"LOW\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 4.7}]}",
      "published": "2024-01-26T16:15:22.597",
      "references": "[{\"url\": \"https://security.netapp.com/advisory/ntap-20240126-0001/\", \"source\": \"security-alert@netapp.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://security.netapp.com/advisory/ntap-20240126-0001/\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security-alert@netapp.com",
      "vulnStatus": "Modified",
      "weaknesses": "[{\"source\": \"security-alert@netapp.com\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-269\"}]}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"NVD-CWE-noinfo\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2024-21985\",\"sourceIdentifier\":\"security-alert@netapp.com\",\"published\":\"2024-01-26T16:15:22.597\",\"lastModified\":\"2024-11-21T08:55:19.830\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 \\nand 9.13.1P4 are susceptible to a vulnerability which could allow an \\nauthenticated user with multiple remote accounts with differing roles to\\n perform actions via REST API beyond their intended privilege. Possible \\nactions include viewing limited configuration details and metrics or \\nmodifying limited settings, some of which could result in a Denial of \\nService (DoS).\\n\\n\\n\\n\"},{\"lang\":\"es\",\"value\":\"Las versiones de ONTAP 9 anteriores a 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 y 9.13.1P4 son susceptibles a una vulnerabilidad que podr\u00eda permitir a un usuario autenticado con m\u00faltiples cuentas remotas con diferentes roles realizar acciones a trav\u00e9s de la API REST m\u00e1s all\u00e1 de su privilegio pretendido. Las posibles acciones incluyen ver m\u00e9tricas y detalles de configuraci\u00f3n limitados o modificar configuraciones limitadas, algunas de las cuales podr\u00edan resultar en una denegaci\u00f3n de servicio (DoS).\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security-alert@netapp.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.7},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H\",\"baseScore\":7.6,\"baseSeverity\":\"HIGH\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.8,\"impactScore\":4.7}]},\"weaknesses\":[{\"source\":\"security-alert@netapp.com\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-269\"}]},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-noinfo\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.0\",\"versionEndExcluding\":\"9.9.1\",\"matchCriteriaId\":\"C1096408-669B-4944-A3C7-CDD8FB3215BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.10.0\",\"versionEndExcluding\":\"9.10.1\",\"matchCriteriaId\":\"D9AB5E20-70A4-412E-B0CE-8D56666D2FFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.11.0\",\"versionEndExcluding\":\"9.11.1\",\"matchCriteriaId\":\"002B4EC4-81D8-4449-A225-3137D37796E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.12.0\",\"versionEndExcluding\":\"9.12.1\",\"matchCriteriaId\":\"46A8E230-FCE4-44CA-9FEC-E4994970776E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"9.13.0\",\"versionEndExcluding\":\"9.13.1\",\"matchCriteriaId\":\"18E30F09-FA25-4B94-9372-5B5FFC4528C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"E0284DC1-9FAA-4979-82C3-AB7347614C80\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.10.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1A4278F-D9A9-4C39-AC53-AB35DB921E02\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.11.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"366B49CA-EB3B-44A1-9DB4-9D24A0F427E5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.12.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD223C45-CF1B-4931-9753-503923FCFE25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:netapp:clustered_data_ontap:9.13.1:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E1CD626-B5E9-4166-A539-09305A5B9696\"}]}]}],\"references\":[{\"url\":\"https://security.netapp.com/advisory/ntap-20240126-0001/\",\"source\":\"security-alert@netapp.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://security.netapp.com/advisory/ntap-20240126-0001/\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.