VMware on Wednesday delivered security updates to handle vulnerabilities in many products that could be possibly exploited by an attacker to just take manage of an affected system.
The 6 security weaknesses (from CVE-2021-22022 via CVE-2021-22027, CVSS scores: 4.4 – 8.6) have an impact on VMware vRealize Operations (prior to edition 8.5.), VMware Cloud Foundation (variations 3.x and 4.x), and vRealize Suite Lifecycle Supervisor (version 8.x), as listed down below –
- CVE-2021-22022 (CVSS score: 4.4) – Arbitrary file browse vulnerability in vRealize Operations Manager API, primary to info disclosure
- CVE-2021-22023 (CVSS rating: 6.6) – Insecure immediate object reference vulnerability in vRealize Functions Manager API, enabling an attacker with administrative accessibility to change other users’ data and seize handle of an account
- CVE-2021-22024 (CVSS rating: 7.5) – Arbitrary log-file read vulnerability in vRealize Functions Supervisor API, ensuing in sensitive details disclosure
- CVE-2021-22025 (CVSS score: 8.6) – Damaged accessibility command vulnerability in vRealize Functions Supervisor API, allowing for an unauthenticated destructive actor to add new nodes to the current vROps cluster
- CVE-2021-22026 and CVE-2021-22027 (CVSS rating: 7.5) – Server Side Request Forgery vulnerability in vRealize Operations Manager API, primary to data disclosure
Credited with reporting the flaws are Egor Dimitrenko of Favourable Systems (CVE-2021-22022 and CVE-2021-22023) and thiscodecc of MoyunSec V-Lab (from CVE-2021-22024 to CVE-2021-22027).
Separately, VMware has also issued patches to remediate cross-website scripting (XSS) vulnerability impacting VMware vRealize Log Perception and VMware Cloud Basis that stems from a case of inappropriate user input validation, enabling an adversary with person privileges to inject malicious payloads via the Log Perception UI that’s executed when a target accesses the shared dashboard connection.
The flaw, which has been assigned the identifier CVE-2021-22021, has been rated 6.5 for severity on the CVSS scoring program. Marcin Kot of Prevenity and Tran Viet Quang of Vantage Position Security have been credited for independently exploring and reporting the vulnerability.
The patches also get there a week following VMware patched a denial-of-company bug in its VMware Workspace One UEM console (CVE-2021-22029, CVSS rating: 5.3) that an actor with entry to “/API/technique/admins/session” could abuse to render the API unavailable owing to inappropriate price restricting.
Discovered this write-up interesting? Adhere to THN on Fb, Twitter and LinkedIn to browse a lot more special material we write-up.
Some sections of this short article are sourced from: