Critical vulnerabilities infesting an IT platform of VMware have been patched up that had the potential to facilitate administrator credentials theft to malicious actors.
VMware, the American cloud computing and virtualization technology company engages in artificial intelligence (AI) based platform that offers “self-driving IT operations management for private, hybrid, and multi-cloud environments” called vRealize.
Earlier this week, the cloud-computing solutions security advisory addressing the security vulnerabilities affecting the VMware vRealize Operations, VMware Cloud Foundation, and vRealize Suite Lifecycle Manager platforms.
These vulnerabilities were detected and reported to VMware Inc. in a private manner by Positive Technologies penetration tester Egor Dimitrenko.
VMware IT platform vulnerabilities:
The first flaw tracked as CVE-2021-21975 has been detected to be a server-side request forgery( SSRF) vulnerability has been rated a high severity rating of 8.6 on the CVSS score.
The particular server-side request forgery( SSRF) vulnerability was discovered on the vRealize Operations Manager API and could have allowed malicious actors with network access to deploys the SSRF attacks to thieve administrator credentials.
The second vulnerability was detected in the same API, although presupposes a malicious actor to have authentication and have network access to facilitate exploitation.
Subsequently, if malicious actors gain these regulations, however — such as by triggering the first vulnerability to steal the necessary credentials — this permits attackers to “write files to arbitrary locations on the underlying photon operating system,” according to the IT management organization.
The particular vulnerability is tracked as CVE-2021-21983 has scores a vulnerability rating of 7.2 on the CVSS score.
VMware security patches:
Security patches have been deployed for the flaws, which affect vRealize Operations Manager 7.5.0, 8.0.1, 8.0.0, 8.1.1, 8.1.0, 8.2.0, and 8.3.0 on any type of operating system deployment. These vulnerabilities also impact VMware Cloud Foundation versions 3x and 4x, along with vRealize Suite Lifecycle Manager 8x.
VMware has provided security patches and workarounds for IT administrators who are unable to immediately apply the fixes.