Unauthenticated iSCSI Initiators can bypass iSCSI authentication on NetApp Filers by manipulating the iSCSI Login Negotiation protocol. The impact of this vulnerability is the negation of iSCSI security on affected NetApp filers.
cbda7558ac20a9e5ae1ab0fe5849ed2b682c6fc6ec99c1de2f5873cfdcc2906a
Whitepaper called Insertion, Evasion, and Denial of Service: Eluding Network Intrusion Detection.
508b3adcfa30b3eb228307da305bfbcb56145693a093e0540551c290bbbef5f8