minute read
Share this article:
CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual servers and workloads that they contain.
A critical security vulnerability in the VMware Carbon Black Cloud Workload appliance would allow privilege escalation and the ability to take over the administrative rights for the solution.
The bug (CVE-2021-21982) ranks 9.1 out of 10 on the CVSS vulnerability-severity scale.
The VMware Carbon Black Cloud Workload platform is designed to provide cybersecurity defense for virtual servers and workloads that are hosted on the VMware’s vSphere platform. vSphere is VMware’s cloud-computing virtualization platform.
The issue in the appliance stems from incorrect URL handling, according to VMware’s advisory issued last week.
VMware Fixes Dangerous Vulnerabilities in Software for Infrastructure Monitoring
Framingham, MA (April 6, 2020) – Positive Technologies expert Egor Dimitrenko discovered two vulnerabilities in VMware vRealize Operations (vROps). The solution is designed for monitoring and optimizing the performance of the virtual infrastructure, and eliminating flaws in it.
The first, and most dangerous vulnerability was detected in the vROps API. The server side request forgery vulnerability is known as CVE-2021-21975 and has a CVSS v3 score of 8.6. By exploiting this flaw, any unauthorized attacker can steal administrative credentials and obtain access to the application with maximum privileges, which allows changing the application configuration and intercepting any data within the app.
Get Permission
VMware has issued patches for two critical vulnerabilities in its IT operations management platform, vRealize Operations, which, if exploited, could allow attackers to steal administrative credentials.
The platform is designed to offer self-driving IT operations management for private, hybrid and multi-cloud environments in a unified platform powered by artificial intelligence.
VMware issued patches on Tuesday for the flaws CVE-2021-21975, which has a CVSS ranking of 8.6, and CVE-2021-21983, which has a CVSSv3 base score of 7.2.
Egor Dimitrenko of Positive Technologies discovered these vulnerabilities and reported them to VMware.
If the two vulnerabilities are chained together, they could enable an attacker to conduct remote code execution in vRealize Operations, Positive Technologies reports.
April 1, 2021
VMware patches critical vRealize Operations flaws that could lead to RCE
Two vulnerabilities (CVE-2021-21975, CVE-2021-21983) recently patched by VMware in its vRealize Operations platform can be chained together to achieve unauthenticated remote code execution (RCE) on the underlying operating system, Positive Technologies researchers have found.
There is no PoC currently available and no mention of the vulnerabilities being exploited in the wild. Nevertheless, administrators are advised to implement provided security patches or temporary workarounds as soon as possible.
VMware vRealize Operations vulnerabilities could lead to RCE
VMware vRealize Operations is a unified, AI-powered platform for IT operations management for private, hybrid, and multi-cloud environments. It is available on premises and as SaaS.
VMware Patches 2 Flaws in vRealize Operations govinfosecurity.com - get the latest breaking news, showbiz & celebrity photos, sport news & rumours, viral videos and top stories from govinfosecurity.com Daily Mail and Mail on Sunday newspapers.