PatchSiren cyber security CVE debrief
CVE-2017-5600 Netapp CVE debrief
CVE-2017-5600 is a critical authentication/credential-management issue in the Data Warehouse component of NetApp OnCommand Insight. According to the CVE record, remote attackers could obtain administrative access by leveraging a default privileged account in versions before 7.2.3. NVD maps the weakness to CWE-798 and rates the issue CVSS 3.0 9.8, reflecting network access, no required privileges, no user interaction, and high impact to confidentiality, integrity, and availability.
- Vendor
- Netapp
- Product
- CVE-2017-5600
- CVSS
- CRITICAL 9.8
- CISA KEV
- Not listed in stored evidence
- Original CVE published
- 2017-02-02
- Original CVE updated
- 2026-05-13
- Advisory published
- 2017-02-02
- Advisory updated
- 2026-05-13
Who should care
Administrators and security teams responsible for NetApp OnCommand Insight deployments, especially any environment running the Data Warehouse component at version 7.2.2 or earlier. This matters most where administrative access to the platform would expose sensitive operational data or allow unauthorized configuration changes.
Technical summary
The CVE record states that the Data Warehouse component in NetApp OnCommand Insight before 7.2.3 allows remote attackers to gain administrative access by leveraging a default privileged account. The NVD CPE scope identifies affected OnCommand Insight versions through 7.2.2 inclusive. NVD classifies the weakness as CWE-798 and assigns CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H, indicating a remotely reachable issue with no prerequisites beyond access to the service.
Defensive priority
Urgent. This is a pre-authentication remote administrative-access issue with full confidentiality, integrity, and availability impact in the affected product scope.
Recommended defensive actions
- Upgrade NetApp OnCommand Insight to version 7.2.3 or later, as identified in the CVE description and NVD version bounds.
- Review any deployments of the Data Warehouse component for exposure and confirm whether affected versions 7.2.2 and earlier are present.
- Audit administrative and service accounts associated with the product for unexpected use or defaults, and rotate any credentials tied to the affected component as part of remediation.
- Limit network access to the management and Data Warehouse interfaces until remediation is complete.
- Refer to the linked NetApp vendor advisory and NVD record for product-specific remediation guidance and validation steps.
Evidence notes
All substantive claims are taken from the supplied CVE data and official reference metadata. The CVE description states the affected component, remote administrative-access impact, and version threshold before 7.2.3. The NVD metadata provides the vulnerable CPE range through 7.2.2 inclusive, the CVSS vector, and CWE-798 classification. The resource links include the official CVE record, NVD detail page, and a NetApp vendor advisory URL, but the advisory text itself was not included in the corpus.
Official resources
-
CVE-2017-5600 CVE record
CVE.org
-
CVE-2017-5600 NVD detail
NVD
-
Source item URL
nvd_modified
-
Mitigation or vendor reference
[email protected] - Third Party Advisory, VDB Entry
-
Mitigation or vendor reference
[email protected] - Vendor Advisory
CVE published: 2017-02-02T15:59:00.170Z. CVE modified: 2026-05-13T00:24:29.033Z. The published date is the authoritative disclosure timestamp used here.