First published: Wed Sep 21 2016(Updated: )
The SMB service in EMC VNXe (VNXe3200 Operating Environment prior to 3.1.5.8711957 and VNXe3100/3150/3300 Operating Environment prior to 2.4.4.22638), VNX1 File OE before 7.1.80.3, VNX2 File OE before 8.1.9.155, and Celerra (all supported versions) does not prevent duplicate NTLM challenge-response nonces, which makes it easier for remote attackers to execute arbitrary code, or read or write to files, via a series of authentication requests, a related issue to CVE-2010-0231.
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC VNX1 OE Firmware | ||
Emc Vnx2 Firmware | ||
EMC VNXe OE Firmware | ||
EMC VNX5200 | ||
Dell EMC VNX5400 | ||
EMC VNX5600 | ||
EMC VNX5800 | ||
Dell EMC VNXe1600 | ||
EMC VNXe3100 | ||
EMC VNXe3150 | ||
EMC VNXe3200 | ||
EMC VNXe3200 | ||
EMC VNXe3300 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0917 has a high severity rating due to its potential to allow unauthorized access through NTLM challenge-response vulnerabilities.
To fix CVE-2016-0917, upgrade the affected EMC VNXe or VNX firmware to the latest available version that addresses this vulnerability.
CVE-2016-0917 affects EMC VNXe3200, VNXe3100/3150/3300, VNX1 File OE, VNX2 File OE and all versions of Celerra.
CVE-2016-0917 is a security vulnerability related to improper handling of NTLM authentication in the SMB service.
There is no official workaround for CVE-2016-0917; the recommended solution is to apply the firmware updates as soon as possible.