PatchSiren cyber security CVE debrief
CVE-2016-9870 Emc CVE debrief
CVE-2016-9870 describes an LDAP injection weakness in EMC Isilon OneFS that could allow a malicious user to compromise affected systems. The issue was publicly recorded on 2017-01-23 and applies to multiple OneFS release families, including 7.1.0.x, 7.1.1.0-7.1.1.10, 7.2.0.x, 7.2.1.0-7.2.1.2, and 8.0.0.0.
- Vendor
- Emc
- Product
- CVE-2016-9870
- CVSS
- MEDIUM 6.7
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-01-23
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-01-23
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for EMC Isilon OneFS deployments, especially environments using LDAP-integrated workflows or where privileged local access is present.
Technical summary
NVD classifies the weakness as CWE-90 (LDAP Injection). The CVSS v3.0 vector is AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H, indicating a local attack that requires high privileges and no user interaction, but can have high impact on confidentiality, integrity, and availability. The affected versions listed in the NVD record match the OneFS release ranges called out in the CVE description.
Defensive priority
Medium — the attack requires local access and high privileges, but the potential impact is broad and the affected version set is large.
Recommended defensive actions
- Confirm whether any affected EMC Isilon OneFS versions are deployed, especially the 7.1.0.x, 7.1.1.x, 7.2.0.x, 7.2.1.x, and 8.0.0.0 branches listed in the record.
- Follow the vendor mitigation/advisory references linked in the NVD record and move to a non-affected release or apply vendor-provided remediation where available.
- Review who has privileged local access to affected appliances and reduce unnecessary administrative access where possible.
- Monitor LDAP-related configuration and administrative changes for unexpected or unauthorized modification.
- Validate that your vulnerability management program has recorded this issue as a local, high-privilege exposure rather than a remotely exploitable flaw.
Evidence notes
Evidence in the supplied corpus comes from the official CVE/NVD record and the references embedded in that record. The NVD entry lists the affected OneFS versions, maps the weakness to CWE-90, and assigns CVSS v3.0 AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H. The provided timeline shows public publication on 2017-01-23 and no KEV designation.
Official resources
-
CVE-2016-9870 CVE record
CVE.org
-
CVE-2016-9870 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Mitigation, Third Party Advisory, VDB Entry
- Source reference
Publicly disclosed in the CVE/NVD record on 2017-01-23. The provided enrichment does not indicate Known Exploited Vulnerabilities status or ransomware campaign use.