VMware has released security updates to address a critical vulnerability, tracked as CVE-2021-39144 (CVSSv3 9.8), in VMware Cloud Foundation. VMware Cloud Foundation™ is the industry’s most advanced hybrid cloud platform. It provides a complete set of software-defined services for compute, storage, networking, security and cloud management to run enterprise apps—traditional or containerized —in private or public environments.
The remote code execution vulnerability resides in the XStream open-source library. Unauthenticated attackers can exploit the vulnerability in low-complexity attacks without user interaction.
“Due to an unauthenticated endpoint that leverages XStream for input serialization in VMware Cloud Foundation (NSX-V), a malicious actor can get remote code execution in the context of ‘root’ on the appliance.” reads the advisory published by the company.
The product team has also released patches for end-of-life products due to the severity of the vulnerability.
The virtualization giant also addressed an XML External Entity (XXE) vulnerability tracked as CVE-2022-31678 (CVSSv3 5.3.). An unauthenticated user may exploit this issue to cause a denial-of-service condition or unintended information disclosure.
Both flaws were reported by researchers Sina Kheirkhah and Steven Seeley from Source Incite.
VMware also published separate guidance to upgrade NSX-V 6.4.14 appliances on VMware Cloud Foundation 3.x.
Below is the step-by-step workaround procedure:
Step 1: Perform below steps on each VMware NSX-V instance deployed in your VMware Cloud Foundation environment
Step 2: Perform below steps on each SDDC Manager VM deployed in your Cloud Foundation environment
Follow me on Twitter: @securityaffairs and Facebook
|[adrotate banner=”9″]||[adrotate banner=”12″]|
(SecurityAffairs – hacking, VMWare)