CVE-2024-21985
Published Jan 26, 2024
Last updated 9 months ago
Overview
- Description
- ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10 and 9.13.1P4 are susceptible to a vulnerability which could allow an authenticated user with multiple remote accounts with differing roles to perform actions via REST API beyond their intended privilege. Possible actions include viewing limited configuration details and metrics or modifying limited settings, some of which could result in a Denial of Service (DoS).
- Source
- security-alert@netapp.com
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.6
- Impact score
- 4.7
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:H
- Severity
- HIGH
Weaknesses
- nvd@nist.gov
- NVD-CWE-noinfo
- security-alert@netapp.com
- CWE-269
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C1096408-669B-4944-A3C7-CDD8FB3215BB", "versionEndExcluding": "9.9.1", "versionStartIncluding": "9.0" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9AB5E20-70A4-412E-B0CE-8D56666D2FFA", "versionEndExcluding": "9.10.1", "versionStartIncluding": "9.10.0" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "002B4EC4-81D8-4449-A225-3137D37796E0", "versionEndExcluding": "9.11.1", "versionStartIncluding": "9.11.0" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46A8E230-FCE4-44CA-9FEC-E4994970776E", "versionEndExcluding": "9.12.1", "versionStartIncluding": "9.12.0" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18E30F09-FA25-4B94-9372-5B5FFC4528C4", "versionEndExcluding": "9.13.1", "versionStartIncluding": "9.13.0" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.9.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E0284DC1-9FAA-4979-82C3-AB7347614C80" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.10.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F1A4278F-D9A9-4C39-AC53-AB35DB921E02" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.11.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "366B49CA-EB3B-44A1-9DB4-9D24A0F427E5" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.12.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD223C45-CF1B-4931-9753-503923FCFE25" }, { "criteria": "cpe:2.3:a:netapp:clustered_data_ontap:9.13.1:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6E1CD626-B5E9-4166-A539-09305A5B9696" } ], "operator": "OR" } ] } ]