Vulnerability Name:

CVE-2017-14387 (CCN-136826)

Assigned:2017-12-18
Published:2017-12-18
Updated:2019-10-03
Summary:The NFS service in EMC Isilon OneFS 8.1.0.0, 8.0.1.0 - 8.0.1.1, and 8.0.0.0 - 8.0.0.4 maintains default NFS export settings (including the NFS export security flavor for authentication) that can be leveraged by current and future NFS exports. This NFS service contained a flaw that did not properly propagate changes made to the default security flavor to all new and existing NFS exports that are configured to use default NFS export settings and that are mounted after those changes are made. This flaw may potentially allow NFS clients to access affected NFS exports using the default and potentially weaker security flavor even if a more secure one was selected to be used by the OneFS administrator, aka an "NFS Export Security Setting Fallback Vulnerability."
CVSS v3 Severity:6.5 Medium (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N)
5.7 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
4.8 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N)
4.2 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N/E:U/RL:O/RC:C)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:6.4 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
4.0 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:P/I:P/A:N)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-noinfo
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2017-14387

Source: CCN
Type: EMC Security Advisory ESA-2017-161
EMC Isilon OneFS NFS Export Security Setting Fallback Vulnerability

Source: CONFIRM
Type: Issue Tracking, Mailing List, Third Party Advisory
http://seclists.org/fulldisclosure/2017/Dec/78

Source: BID
Type: Third Party Advisory, VDB Entry
102292

Source: CCN
Type: BID-102292
EMC Isilon OneFS CVE-2017-14387 Security Bypass Vulnerability

Source: XF
Type: UNKNOWN
emc-isilon-cve201714387-unauth-access(136826)

Vulnerable Configuration:Configuration 1:
  • cpe:/o:emc:isilon_onefs:8.0.0.0:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.0.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.0.0.2:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.0.0.3:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.0.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.0.1.0:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:emc:isilon_onefs:8.1.0.0:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    emc isilon onefs 8.0.0.0
    emc isilon onefs 8.0.0.1
    emc isilon onefs 8.0.0.2
    emc isilon onefs 8.0.0.3
    emc isilon onefs 8.0.0.4
    emc isilon onefs 8.0.1.0
    emc isilon onefs 8.0.1.1
    emc isilon onefs 8.1.0.0