- VMware vSphere Security Cookbook
- Mike Greer
- 323字
- 2021-08-05 17:16:04
Storage vulnerabilities
At the time of writing this book, there were no publicized vulnerabilities for any of the major SAN or NAS vendors specific to the access protocols' Fiber Channel or iSCSI. The following two vulnerabilities are for storage vendor management, listed in the National Vulnerability Database (http://nvd.nist.gov).
A number of the vulnerabilities listed specific to storage center around some form of management and authentication information being sent or stored in clear text:
Note
National Cyber Awareness System
Vulnerability summary for CVE-2013-3278
Original release date: 10/01/2013
Last revised: 10/02/2013
Source: US-CERT/NIST
Overview
EMC VPLEX before VPLEX GeoSynchrony 5.2 SP1 uses cleartext for storage of the LDAP/AD bind password, which allows local users to obtain sensitive information by reading the management-server configuration file.
Impact
CVSS severity (Version 2.0):
CVSS v2 base score: 4.9 (MEDIUM) (AV:L/AC:L/Au:N/C:C/I:N/A:N) (legend)
Impact subscore: 6.9
Exploitability subscore: 3.9
CVSS Version 2 metrics:
Access vector: Locally exploitable
Access complexity: Low
Authentication: Not required to exploit
Impact type: This allows the unauthorized disclosure of information
Another example from Hitachi shows vulnerability in the Network Node Manager that allows remote attacks:
Note
National Cyber Awareness System
Vulnerability summary for CVE-2012-5001
Original release date: 09/19/2012
Last revised: 09/20/2012
Source: US-CERT/NIST
Overview
Multiple unspecified vulnerabilities in Hitachi JP1/Cm2/Network Node Manager i before 09-50-03 allow remote attackers to cause a denial of service and possibly execute the arbitrary code via unspecified vectors.
Impact
CVSS severity (Version 2.0):
CVSS v2 base score: 7.5 (HIGH) (AV:N/AC:L/Au:N/C:P/I:P/A:P) (legend)
Impact subscore: 6.4
Exploitability subscore: 10.0
CVSS Version 2 metrics:
Access vector: Network exploitable
Access complexity: Low
**NOTE: Access complexity is scored low due to insufficient information
Authentication: Not required to exploit
Impact type: This allows unauthorized disclosure of information, unauthorized modification, and the disruption of service
Both of these example vulnerabilities are in the management layer of the storage device, not within the data stream specific to the protocol transferring information between the SAN or NAS drivers and the hypervisor.
- 計算機網絡安全技術(第6版·慕課版)
- 網絡空間攻防技術原理
- 黑客攻防與電腦安全從新手到高手(微視頻+火力升級版)
- Preventing Digital Extortion
- 黑客攻防與無線安全從新手到高手(超值版)
- 網絡安全三十六計:人人該懂的防黑客技巧
- Kali Linux Wireless Penetration Testing Cookbook
- 學電腦安全與病毒防范
- API安全技術與實戰
- Learn Azure Sentinel
- Securing Network Infrastructure
- 安全網絡構建
- 從實踐中學習Nmap滲透測試
- 企業安全建設入門:基于開源軟件打造企業網絡安全
- ATT&CK框架實踐指南(第2版)