VMware has released security updates to address a critical vulnerability, tracked as CVE-2021-39144 (CVSSv3 9.8), in VMware Cloud Foundation. VMware Cloud Foundation™ is the industry’s most advanced hybrid cloud platform. It provides a complete set of software-defined services for compute, storage, networking, security and cloud management to run enterprise apps—traditional or containerized —in private or public environments.
The remote code execution vulnerability resides in the XStream open-source library. Unauthenticated attackers can exploit the vulnerability in low-complexity attacks without user interaction.
“Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V), a malicious actor can get remote code execution in the context of ‘root’ on the appliance.” reads the advisory published by the company.
The product team has also released patches for end-of-life products due to the severity of the vulnerability.
The virtualization giant also addressed an XML External Entity (XXE) vulnerability tracked as CVE-2022-31678 (CVSSv3 5.3.). An unauthenticated user may exploit this issue to cause a denial-of-service condition or unintended information disclosure.
Both flaws were reported by researchers Sina Kheirkhah and Steven Seeley from Source Incite.
VMware also published separate guidance to upgrade NSX-V 6.4.14 appliances on VMware Cloud Foundation 3.x.
Below is the step-by-step workaround procedure:
Step 1: Perform below steps on each VMware NSX-V instance deployed in your VMware Cloud Foundation environment
Step 2: Perform below steps on each SDDC Manager VM deployed in your Cloud Foundation environment
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, VMWare)
[adrotate banner=”5″]
[adrotate banner=”13″]
The National Police Agency in South Korea warns that North Korea-linked threat actors are targeting…
The U.S. Department of State imposed visa restrictions on 13 individuals allegedly linked to the…
A cyber attack has been disrupting operations at Synlab Italia, a leading provider of medical…
Russia-linked APT28 group used a previously unknown tool, dubbed GooseEgg, to exploit Windows Print Spooler…
A financially motivated group named GhostR claims the theft of a sensitive database from World-Check…
Researcher demonstrated how to exploit vulnerabilities in the Windows DOS-to-NT path conversion process to achieve…
This website uses cookies.