First published: Wed Dec 20 2017(Updated: )
The NFS service in EMC Isilon OneFS 8.1.0.0, 8.0.1.0 - 8.0.1.1, and 8.0.0.0 - 8.0.0.4 maintains default NFS export settings (including the NFS export security flavor for authentication) that can be leveraged by current and future NFS exports. This NFS service contained a flaw that did not properly propagate changes made to the default security flavor to all new and existing NFS exports that are configured to use default NFS export settings and that are mounted after those changes are made. This flaw may potentially allow NFS clients to access affected NFS exports using the default and potentially weaker security flavor even if a more secure one was selected to be used by the OneFS administrator, aka an "NFS Export Security Setting Fallback Vulnerability."
Credit: security_alert@emc.com
Affected Software | Affected Version | How to fix |
---|---|---|
EMC Isilon OneFS | =8.0.0.0 | |
EMC Isilon OneFS | =8.0.0.1 | |
EMC Isilon OneFS | =8.0.0.2 | |
EMC Isilon OneFS | =8.0.0.3 | |
EMC Isilon OneFS | =8.0.0.4 | |
EMC Isilon OneFS | =8.0.1.0 | |
EMC Isilon OneFS | =8.0.1.1 | |
EMC Isilon OneFS | =8.1.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2017-14387 is a vulnerability in the NFS service of EMC Isilon OneFS versions 8.0.0.0 to 8.0.0.4, 8.0.1.0 to 8.0.1.1, and 8.1.0.0.
No, CVE-2017-14387 is considered a medium severity vulnerability with a severity score of 6.5.
CVE-2017-14387 allows an attacker to leverage default NFS export settings, potentially compromising the security of current and future NFS exports in EMC Isilon OneFS.
EMC Isilon OneFS versions 8.0.0.0 to 8.0.0.4, 8.0.1.0 to 8.0.1.1, and 8.1.0.0 are affected by CVE-2017-14387.
Apply the necessary patches or updates provided by EMC to address CVE-2017-14387.