CVE-2024-21985

7.6 HIGH

📋 TL;DR

This vulnerability in NetApp ONTAP allows authenticated users with multiple remote accounts to perform REST API actions beyond their intended privileges. Affected users can view configuration details, modify settings, and potentially cause Denial of Service. This affects ONTAP 9 versions prior to specific patch releases.

💻 Affected Systems

Products:
  • NetApp ONTAP
Versions: ONTAP 9 versions prior to 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10, and 9.13.1P4
Operating Systems: ONTAP OS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated user with multiple remote accounts having different roles. REST API access must be enabled.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker with multiple accounts could modify critical settings causing system-wide Denial of Service, potentially disrupting storage operations.

🟠

Likely Case

Privilege escalation allowing users to view sensitive configuration details or modify limited settings they shouldn't have access to.

🟢

If Mitigated

Minimal impact with proper access controls, monitoring, and single-account policies in place.

🌐 Internet-Facing: MEDIUM - REST API endpoints may be exposed, but requires authenticated access with multiple accounts.
🏢 Internal Only: HIGH - Internal users with multiple accounts could exploit this for privilege escalation and DoS.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires authenticated access with multiple accounts and knowledge of REST API endpoints. No public exploit code available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ONTAP 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10, or 9.13.1P4

Vendor Advisory: https://security.netapp.com/advisory/ntap-20240126-0001/

Restart Required: Yes

Instructions:

1. Check current ONTAP version. 2. Download appropriate patch from NetApp Support Site. 3. Apply patch following NetApp upgrade procedures. 4. Reboot system as required. 5. Verify patch installation.

🔧 Temporary Workarounds

Restrict Account Creation

all

Limit users to single remote accounts to prevent exploitation requiring multiple accounts.

# Review and enforce single-account policies for ONTAP users
# Use: security login create/modify commands to manage accounts

Restrict REST API Access

all

Limit REST API access to trusted networks and implement strict authentication controls.

# Configure network restrictions for REST API endpoints
# Use: network interface modify commands

🧯 If You Can't Patch

  • Implement strict access controls limiting users to single remote accounts
  • Monitor REST API logs for unusual privilege escalation attempts

🔍 How to Verify

Check if Vulnerable:

Check ONTAP version using 'system node show -version' and compare against affected versions list.

Check Version:

system node show -version

Verify Fix Applied:

Verify version is 9.9.1P18, 9.10.1P16, 9.11.1P13, 9.12.1P10, or 9.13.1P4 or later using 'system node show -version'.

📡 Detection & Monitoring

Log Indicators:

  • Multiple account logins from same user
  • REST API calls performing actions beyond user's normal role
  • Configuration changes from non-admin accounts

Network Indicators:

  • Unusual REST API traffic patterns
  • Multiple authentication requests from same source

SIEM Query:

source="ontap" AND (event_type="authentication" AND user_count>1) OR (event_type="api_call" AND privilege_escalation=true)

🔗 References

📤 Share & Export