开始新对话

此帖子已超过 5 年

Solved!

Go to Solution

1365

2017年5月17日 19:00

【微信群提问分享】EMC的存储会不会被勒索病毒攻击?CX、VNX系列存储,有没有关闭端口?

微信群用户“D”提问:


EMC的存储会不会被勒索病毒攻击?CX、VNX系列存储,有没有关闭端口?

329 消息

2017年5月17日 19:00

微信群用户”R“ 回复:


CX、VNX的SP上所有不需要的服务和端口都是关闭的。


CLARiiON和VNX使用到的端口参考:

https://support.emc.com/docu9612_CLARiiON-30-Security-Configuration-Guide.pdf?language=en_US

https://support.emc.com/docu34574_Security-Configuration-Guide-on-VNX-for-Block.pdf?language=en_US

4K 消息

2017年5月30日 22:00

补充一下EMC官方对微软MS17-010漏洞的说明:

Microsoft Security Bulletin MS17-010 ("WannaCry") Vulnerabilities in EMC Products https://support.emc.com/kb/499808

Dell EMC recommends that all customers review their products Security Configuration Guide (https://support.emc.com/security) in addition to following best practices in securing internal networks and protecting systems from unauthorized physical access which may lead to their system being compromised.

Product Versions Details
CLARiiON AX4 All Not exploitable. SMBv1 protocol is blocked by design and not accessible from external communications in CLARiiON AX4.
CLARiiON CX3/ CX4 All Not exploitable. SMBv1 protocol is blocked by design and not accessible from external communications in CLARiiON CX3/CX4.
VNX1 All Not exploitable. SMBv1 protocol is blocked by design and not accessible from external communications in the VNX Block system.
VNX2 All Not exploitable. SMBv1 protocol is blocked by design and not accessible from external communications in the VNX Block system.
VMAX / DMX All

The default configuration of the firewall contained in the service processor / MMCS effectively prevents the exploitation of the MS17-010 vulnerabilities. Please see ETA 499903: Symmetrix, DMX-4, VMAX, VMAX3: Ransomware attacks on VMAX/DMX - Vulnerability in MS-17-010 for more details.

找不到事件!

Top