VMware on Wednesday delivered protection updates to deal with vulnerabilities in numerous goods that could be perhaps exploited by an attacker to consider management of an impacted method.
The six safety weaknesses (from CVE-2021-22022 via CVE-2021-22027, CVSS scores: 4.4 – 8.6) influence VMware vRealize Operations (prior to model 8.5.), VMware Cloud Foundation (variations 3.x and 4.x), and vRealize Suite Lifecycle Manager (model 8.x), as stated beneath –
- CVE-2021-22022 (CVSS rating: 4.4) – Arbitrary file examine vulnerability in vRealize Operations Manager API, main to facts disclosure
- CVE-2021-22023 (CVSS score: 6.6) – Insecure immediate object reference vulnerability in vRealize Functions Supervisor API, enabling an attacker with administrative accessibility to alter other users’ facts and seize control of an account
- CVE-2021-22024 (CVSS score: 7.5) – Arbitrary log-file study vulnerability in vRealize Functions Supervisor API, ensuing in delicate information and facts disclosure
- CVE-2021-22025 (CVSS score: 8.6) – Broken accessibility handle vulnerability in vRealize Functions Supervisor API, allowing for an unauthenticated destructive actor to increase new nodes to the present vROps cluster
- CVE-2021-22026 and CVE-2021-22027 (CVSS score: 7.5) – Server Side Ask for Forgery vulnerability in vRealize Operations Manager API, top to information disclosure
Credited with reporting the flaws are Egor Dimitrenko of Good Technologies (CVE-2021-22022 and CVE-2021-22023) and thiscodecc of MoyunSec V-Lab (from CVE-2021-22024 to CVE-2021-22027).
Individually, VMware has also issued patches to remediate a cross-web-site scripting (XSS) vulnerability impacting VMware vRealize Log Insight and VMware Cloud Foundation that stems from a circumstance of incorrect person input validation, enabling an adversary with user privileges to inject malicious payloads by way of the Log Perception UI that is executed when a target accesses the shared dashboard hyperlink.
The flaw, which has been assigned the identifier CVE-2021-22021, has been rated 6.5 for severity on the CVSS scoring system. Marcin Kot of Prevenity and Tran Viet Quang of Vantage Position Stability have been credited for independently discovering and reporting the vulnerability.
The patches also arrive a 7 days after VMware patched a denial-of-assistance bug in its VMware Workspace One UEM console (CVE-2021-22029, CVSS rating: 5.3) that an actor with access to “/API/system/admins/session” could abuse to render the API unavailable due to improper price limiting.