First published: Thu Oct 27 2005(Updated: )
Network Appliance Data ONTAP 7.0 and earlier allows iSCSI Initiators to bypass iSCSI authentication via a modified client that skips the Security (Start) mode, as required by the Login Negotiation protocol, and uses Operational mode without proving identity.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
NetApp ONTAP | =6.5 | |
NetApp ONTAP | =6.4 | |
NetApp ONTAP | <=7.0 | |
NetApp ONTAP | <=7.0 | |
NetApp ONTAP | =6.4 | |
NetApp ONTAP | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-3327 is considered a critical vulnerability as it allows unauthorized access to iSCSI storage systems.
To mitigate CVE-2005-3327, upgrade to a version of Data ONTAP later than 7.0 that includes proper iSCSI authentication measures.
CVE-2005-3327 affects Network Appliance Data ONTAP versions 7.0 and earlier, specifically 6.4 and 6.5.
CVE-2005-3327 can be exploited by iSCSI initiators using modified clients that bypass authentication by skipping the Security (Start) mode.
The impact of CVE-2005-3327 includes potential unauthorized data access and manipulation in iSCSI environments.