// For flags

CVE-2016-5195

Linux Kernel Race Condition Vulnerability

Severity Score

7.0
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

32
*Multiple Sources

Exploited in Wild

Yes
*KEV

Decision

-
*SSVC
Descriptions

Race condition in mm/gup.c in the Linux kernel 2.x through 4.x before 4.8.3 allows local users to gain privileges by leveraging incorrect handling of a copy-on-write (COW) feature to write to a read-only memory mapping, as exploited in the wild in October 2016, aka "Dirty COW."

La condición de carrera en mm / gup.c en el kernel de Linux 2.x a 4.x antes de 4.8.3 permite a los usuarios locales obtener privilegios aprovechando el manejo incorrecto de una función copy-on-write (COW) para escribir en un read- only la cartografía de la memoria, como explotados en la naturaleza en octubre de 2016, vulnerabilidad también conocida como "Dirty COW".

A race condition was found in the way the Linux kernel's memory subsystem handled the copy-on-write (COW) breakage of private read-only memory mappings. An unprivileged, local user could use this flaw to gain write access to otherwise read-only memory mappings and thus increase their privileges on the system.

Race condition in mm/gup.c in the Linux kernel allows local users to escalate privileges.

*Credits: N/A
CVSS Scores
Attack Vector
Local
Attack Complexity
High
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Privileges Required
Low
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Attack Vector
Local
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
Attack Vector
Local
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2016-05-31 CVE Reserved
  • 2016-10-20 CVE Published
  • 2016-10-21 First Exploit
  • 2022-03-03 Exploited in Wild
  • 2022-03-24 KEV Due Date
  • 2024-07-25 EPSS Updated
  • 2024-08-06 CVE Updated
CWE
  • CWE-362: Concurrent Execution using Shared Resource with Improper Synchronization ('Race Condition')
CAPEC
References (147)
URL Tag Source
http://fortiguard.com/advisory/FG-IR-16-063 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10770 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10774 Third Party Advisory
http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10807 Third Party Advisory
http://packetstormsecurity.com/files/142151/Kernel-Live-Patch-Security-Notice-LSN-0021-1.html Third Party Advisory
http://www.huawei.com/en/psirt/security-advisories/huawei-sa-20161207-01-dirtycow-en Third Party Advisory
http://www.kernel.org/pub/linux/kernel/v4.x/ChangeLog-4.8.3 Release Notes
http://www.openwall.com/lists/oss-security/2016/10/21/1 Mailing List
http://www.openwall.com/lists/oss-security/2016/10/26/7 Mailing List
http://www.openwall.com/lists/oss-security/2016/10/27/13 Mailing List
http://www.openwall.com/lists/oss-security/2016/10/30/1 Mailing List
http://www.openwall.com/lists/oss-security/2016/11/03/7 Mailing List
http://www.openwall.com/lists/oss-security/2022/03/07/1 Mailing List
http://www.openwall.com/lists/oss-security/2022/08/08/1 Mailing List
http://www.openwall.com/lists/oss-security/2022/08/08/2 Mailing List
http://www.openwall.com/lists/oss-security/2022/08/08/7 Mailing List
http://www.openwall.com/lists/oss-security/2022/08/08/8 Mailing List
http://www.openwall.com/lists/oss-security/2022/08/09/4 Mailing List
http://www.openwall.com/lists/oss-security/2022/08/15/1 Mailing List
http://www.securityfocus.com/archive/1/539611/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/540252/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/540344/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/540736/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/archive/1/539611/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/archive/1/540252/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/archive/1/540344/100/0/threaded Broken Link
http://www.securityfocus.com/archive/1/archive/1/540736/100/0/threaded Broken Link
http://www.securityfocus.com/bid/93793 Broken Link
http://www.securitytracker.com/id/1037078 Broken Link
https://access.redhat.com/security/cve/cve-2016-5195 Third Party Advisory
https://access.redhat.com/security/vulnerabilities/2706661 Third Party Advisory
https://bugzilla.suse.com/show_bug.cgi?id=1004418 Issue Tracking
https://dirtycow.ninja Third Party Advisory
https://github.com/dirtycow/dirtycow.github.io/wiki/PoCs Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-c05352241 Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03707en_us Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03722en_us Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03742en_us Third Party Advisory
https://h20566.www2.hpe.com/hpsc/doc/public/display?docLocale=en_US&docId=emr_na-hpesbgn03761en_us Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05341463 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05347541 Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05352241 Third Party Advisory
https://help.ecostruxureit.com/display/public/UADCO8x/StruxureWare+Data+Center+Operation+Software+Vulnerability+Fixes Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10176 Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10177 Broken Link
https://kc.mcafee.com/corporate/index?page=content&id=SB10222 Broken Link
https://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5195.html Third Party Advisory
https://security-tracker.debian.org/tracker/CVE-2016-5195 Issue Tracking
https://security.netapp.com/advisory/ntap-20161025-0001 Third Party Advisory
https://security.paloaltonetworks.com/CVE-2016-5195 Third Party Advisory
https://source.android.com/security/bulletin/2016-11-01.html Third Party Advisory
https://source.android.com/security/bulletin/2016-12-01.html Third Party Advisory
https://www.arista.com/en/support/advisories-notices/security-advisories/1753-security-advisory-0026 Third Party Advisory
https://www.kb.cert.org/vuls/id/243144 Third Party Advisory
URL Date SRC
https://github.com/dirtycow/dirtycow.github.io 2016-10-21
https://www.exploit-db.com/exploits/40611 2024-08-06
https://www.exploit-db.com/exploits/40838 2016-10-26
https://www.exploit-db.com/exploits/40616 2024-08-06
https://www.exploit-db.com/exploits/40839 2024-08-06
https://www.exploit-db.com/exploits/40847 2024-08-06
https://github.com/timwr/CVE-2016-5195 2021-02-03
https://github.com/gbonacini/CVE-2016-5195 2017-03-21
https://github.com/whu-enjoy/CVE-2016-5195 2016-11-17
https://github.com/jas502n/CVE-2016-5195 2019-08-13
https://github.com/arttnba3/CVE-2016-5195 2021-05-24
https://github.com/TotallyNotAHaxxer/CVE-2016-5195 2022-04-08
https://github.com/ASUKA39/CVE-2016-5195 2024-04-05
https://github.com/fei9747/CVE-2016-5195 2021-04-08
https://github.com/ldenevi/CVE-2016-5195 2016-11-06
https://github.com/DanielEbert/CVE-2016-5195 2021-02-22
https://github.com/ASRTeam/CVE-2016-5195 2016-10-21
https://github.com/sribaba/android-CVE-2016-5195 2017-01-04
https://github.com/acidburnmi/CVE-2016-5195-master 2017-12-05
https://github.com/EDLLT/CVE-2016-5195-master 2023-11-29
https://github.com/NguyenCongHaiNam/Research-CVE-2016-5195 2023-10-26
https://github.com/titanhp/Dirty-COW-CVE-2016-5195-Testing 2017-10-19
https://github.com/zakariamaaraki/Dirty-COW-CVE-2016-5195- 2021-01-04
https://github.com/dulanjaya23/Dirty-Cow-CVE-2016-5195- 2020-05-12
https://github.com/shanuka-ashen/Dirty-Cow-Explanation-CVE-2016-5195- 2020-05-11
http://packetstormsecurity.com/files/139277/Kernel-Live-Patch-Security-Notice-LSN-0012-1.html 2024-08-06
http://packetstormsecurity.com/files/139286/DirtyCow-Linux-Kernel-Race-Condition.html 2024-08-06
http://packetstormsecurity.com/files/139287/DirtyCow-Local-Root-Proof-Of-Concept.html 2024-08-06
http://packetstormsecurity.com/files/139922/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html 2024-08-06
http://packetstormsecurity.com/files/139923/Linux-Kernel-Dirty-COW-PTRACE_POKEDATA-Privilege-Escalation.html 2024-08-06
https://bugzilla.redhat.com/show_bug.cgi?id=1384344 2024-08-06
https://github.com/dirtycow/dirtycow.github.io/wiki/VulnerabilityDetails 2024-08-06
URL Date SRC
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00034.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00035.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00036.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00038.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00039.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00040.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00045.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00048.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00049.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00050.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00051.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00052.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00053.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00054.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00055.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00056.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00057.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00058.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00063.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00064.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00065.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00066.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00067.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-10/msg00072.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00033.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2016-12/msg00100.html 2024-07-24
http://lists.opensuse.org/opensuse-security-announce/2020-04/msg00041.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2098.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2105.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2106.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2107.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2110.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2118.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2120.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2124.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2126.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2127.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2128.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2132.html 2024-07-24
http://rhn.redhat.com/errata/RHSA-2016-2133.html 2024-07-24
http://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20161026-linux 2024-07-24
http://www.debian.org/security/2016/dsa-3696 2024-07-24
http://www.ubuntu.com/usn/USN-3104-1 2024-07-24
http://www.ubuntu.com/usn/USN-3104-2 2024-07-24
http://www.ubuntu.com/usn/USN-3105-1 2024-07-24
http://www.ubuntu.com/usn/USN-3105-2 2024-07-24
http://www.ubuntu.com/usn/USN-3106-1 2024-07-24
http://www.ubuntu.com/usn/USN-3106-2 2024-07-24
http://www.ubuntu.com/usn/USN-3106-3 2024-07-24
http://www.ubuntu.com/usn/USN-3106-4 2024-07-24
http://www.ubuntu.com/usn/USN-3107-1 2024-07-24
http://www.ubuntu.com/usn/USN-3107-2 2024-07-24
https://access.redhat.com/errata/RHSA-2017:0372 2024-07-24
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/E7M62SRP6CZLJ4ZXCRZKV4WPLQBSR7DT 2024-07-24
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/NWMDLBWMGZKFHMRJ7QUQVCERP5QHDB6W 2024-07-24
https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/W3APRVDVPDBXLH4DC5UKZVCR742MJIM3 2024-07-24
https://tools.cisco.com/security/center/content/CiscoSecurityAdvisory/cisco-sa-20181107-vcsd 2024-07-24
https://access.redhat.com/security/cve/CVE-2016-5195 2017-03-02
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
12.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "12.04"
-
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
14.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "14.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.04
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.04"
esm
Affected
Canonical
Search vendor "Canonical"
Ubuntu Linux
Search vendor "Canonical" for product "Ubuntu Linux"
16.10
Search vendor "Canonical" for product "Ubuntu Linux" and version "16.10"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 2.6.22 < 3.2.83
Search vendor "Linux" for product "Linux Kernel" and version " >= 2.6.22 < 3.2.83"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.3 < 3.4.113
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.3 < 3.4.113"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.5 < 3.10.104
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.5 < 3.10.104"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.11 < 3.12.66
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.11 < 3.12.66"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.13 < 3.16.38
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.13 < 3.16.38"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.17 < 3.18.44
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.17 < 3.18.44"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 3.19 < 4.1.35
Search vendor "Linux" for product "Linux Kernel" and version " >= 3.19 < 4.1.35"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.2 < 4.4.26
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.2 < 4.4.26"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.5 < 4.7.9
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.5 < 4.7.9"
-
Affected
Linux
Search vendor "Linux"
Linux Kernel
Search vendor "Linux" for product "Linux Kernel"
>= 4.8 < 4.8.3
Search vendor "Linux" for product "Linux Kernel" and version " >= 4.8 < 4.8.3"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
5
Search vendor "Redhat" for product "Enterprise Linux" and version "5"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
6.0
Search vendor "Redhat" for product "Enterprise Linux" and version "6.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux
Search vendor "Redhat" for product "Enterprise Linux"
7.0
Search vendor "Redhat" for product "Enterprise Linux" and version "7.0"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Aus
Search vendor "Redhat" for product "Enterprise Linux Aus"
6.2
Search vendor "Redhat" for product "Enterprise Linux Aus" and version "6.2"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Aus
Search vendor "Redhat" for product "Enterprise Linux Aus"
6.4
Search vendor "Redhat" for product "Enterprise Linux Aus" and version "6.4"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Aus
Search vendor "Redhat" for product "Enterprise Linux Aus"
6.5
Search vendor "Redhat" for product "Enterprise Linux Aus" and version "6.5"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
6.6
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "6.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
6.7
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "6.7"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Eus
Search vendor "Redhat" for product "Enterprise Linux Eus"
7.1
Search vendor "Redhat" for product "Enterprise Linux Eus" and version "7.1"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Long Life
Search vendor "Redhat" for product "Enterprise Linux Long Life"
5.6
Search vendor "Redhat" for product "Enterprise Linux Long Life" and version "5.6"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Long Life
Search vendor "Redhat" for product "Enterprise Linux Long Life"
5.9
Search vendor "Redhat" for product "Enterprise Linux Long Life" and version "5.9"
-
Affected
Redhat
Search vendor "Redhat"
Enterprise Linux Tus
Search vendor "Redhat" for product "Enterprise Linux Tus"
6.5
Search vendor "Redhat" for product "Enterprise Linux Tus" and version "6.5"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
7.0
Search vendor "Debian" for product "Debian Linux" and version "7.0"
-
Affected
Debian
Search vendor "Debian"
Debian Linux
Search vendor "Debian" for product "Debian Linux"
8.0
Search vendor "Debian" for product "Debian Linux" and version "8.0"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
23
Search vendor "Fedoraproject" for product "Fedora" and version "23"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
24
Search vendor "Fedoraproject" for product "Fedora" and version "24"
-
Affected
Fedoraproject
Search vendor "Fedoraproject"
Fedora
Search vendor "Fedoraproject" for product "Fedora"
25
Search vendor "Fedoraproject" for product "Fedora" and version "25"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Pan-os
Search vendor "Paloaltonetworks" for product "Pan-os"
>= 5.1 < 7.0.14
Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 5.1 < 7.0.14"
-
Affected
Paloaltonetworks
Search vendor "Paloaltonetworks"
Pan-os
Search vendor "Paloaltonetworks" for product "Pan-os"
>= 7.1.0 < 7.1.8
Search vendor "Paloaltonetworks" for product "Pan-os" and version " >= 7.1.0 < 7.1.8"
-
Affected
Netapp
Search vendor "Netapp"
Cloud Backup
Search vendor "Netapp" for product "Cloud Backup"
--
Affected
Netapp
Search vendor "Netapp"
Hci Storage Nodes
Search vendor "Netapp" for product "Hci Storage Nodes"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Balance
Search vendor "Netapp" for product "Oncommand Balance"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Performance Manager
Search vendor "Netapp" for product "Oncommand Performance Manager"
--
Affected
Netapp
Search vendor "Netapp"
Oncommand Unified Manager For Clustered Data Ontap
Search vendor "Netapp" for product "Oncommand Unified Manager For Clustered Data Ontap"
--
Affected
Netapp
Search vendor "Netapp"
Ontap Select Deploy Administration Utility
Search vendor "Netapp" for product "Ontap Select Deploy Administration Utility"
--
Affected
Netapp
Search vendor "Netapp"
Snapprotect
Search vendor "Netapp" for product "Snapprotect"
--
Affected
Netapp
Search vendor "Netapp"
Solidfire
Search vendor "Netapp" for product "Solidfire"
--
Affected