PatchSiren

PatchSiren cyber security CVE debrief

CVE-2017-5600 Netapp CVE debrief

CVE-2017-5600 is a critical authentication/credential-management issue in the Data Warehouse component of NetApp OnCommand Insight. According to the CVE record, remote attackers could obtain administrative access by leveraging a default privileged account in versions before 7.2.3. NVD maps the weakness to CWE-798 and rates the issue CVSS 3.0 9.8, reflecting network access, no required privileges, no user interaction, and high impact to confidentiality, integrity, and availability.

Vendor
Netapp
Product
CVE-2017-5600
CVSS
CRITICAL 9.8
CISA KEV
Not listed in stored evidence
Original CVE published
2017-02-02
Original CVE updated
2026-05-13
Advisory published
2017-02-02
Advisory updated
2026-05-13

Who should care

Administrators and security teams responsible for NetApp OnCommand Insight deployments, especially any environment running the Data Warehouse component at version 7.2.2 or earlier. This matters most where administrative access to the platform would expose sensitive operational data or allow unauthorized configuration changes.

Technical summary

The CVE record states that the Data Warehouse component in NetApp OnCommand Insight before 7.2.3 allows remote attackers to gain administrative access by leveraging a default privileged account. The NVD CPE scope identifies affected OnCommand Insight versions through 7.2.2 inclusive. NVD classifies the weakness as CWE-798 and assigns CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable issue with no prerequisites beyond access to the service.

Defensive priority

Urgent. This is a pre-authentication remote administrative-access issue with full confidentiality, integrity, and availability impact in the affected product scope.

Recommended defensive actions

  • Upgrade NetApp OnCommand Insight to version 7.2.3 or later, as identified in the CVE description and NVD version bounds.
  • Review any deployments of the Data Warehouse component for exposure and confirm whether affected versions 7.2.2 and earlier are present.
  • Audit administrative and service accounts associated with the product for unexpected use or defaults, and rotate any credentials tied to the affected component as part of remediation.
  • Limit network access to the management and Data Warehouse interfaces until remediation is complete.
  • Refer to the linked NetApp vendor advisory and NVD record for product-specific remediation guidance and validation steps.

Evidence notes

All substantive claims are taken from the supplied CVE data and official reference metadata. The CVE description states the affected component, remote administrative-access impact, and version threshold before 7.2.3. The NVD metadata provides the vulnerable CPE range through 7.2.2 inclusive, the CVSS vector, and CWE-798 classification. The resource links include the official CVE record, NVD detail page, and a NetApp vendor advisory URL, but the advisory text itself was not included in the corpus.

Official resources

CVE published: 2017-02-02T15:59:00.170Z. CVE modified: 2026-05-13T00:24:29.033Z. The published date is the authoritative disclosure timestamp used here.