» » VMware Patches Critical Vulnerability in End-of-Life Product

VMware Patches Critical Vulnerability in End-of-Life Product

VMware Patches Critical Vulnerability in End-of-Life Product

House › Vulnerabilities

VMware Patches Essential Vulnerability in Finish-of-Life Product

By Ionut Arghire on October 26, 2022

Tweet

VMware this week introduced patches for a essential distant code execution vulnerability in VMware Cloud Basis and NSX Information Middle for vSphere (NSX-V).

Tracked as CVE-2021-39144 (CVSS rating of 9.8), the safety defect exists in XStream, an open supply library to serialize objects to XML and again.

The bug impacts all XStream iterations till and together with model 1.4.17. Solely out-of-the-box variations are affected, however not these the place XStream’s safety framework was arrange with a whitelist restricted to the minimal required sorts.

“On account of an unauthenticated endpoint that leverages XStream for enter serialization in VMware Cloud Basis (NSX-V), a malicious actor can get distant code execution within the context of ‘root’ on the equipment,” VMware notes in its advisory.

NSX-V 6.4.x reached finish of normal help in January 2022. VMware says that it usually doesn’t point out end-of-life (EOL) merchandise in its advisories, however on this case it has determined to launch the patch because of the vulnerability’s essential severity.

VMware says that each one NSX-V variations prior to six.4.14 and VMware Cloud Basis (VCF) 3.x releases are impacted. The vulnerability has been addressed with the discharge of NSX-v 6.4.14 and VCF 3.11.0.1.

VMware’s advisory additionally describes a medium-severity XML Exterior Entity (XXE) vulnerability in VCF (CVE-2022-31678) that might be exploited by unauthenticated attackers to trigger a denial-of-service (DoS) situation or to leak info.

Based on Tenable senior employees analysis engineer Satnam Narang, the essential severity of the vulnerability and the truth that VMware selected to launch a patch for it might point out that it’s straightforward to take advantage of and that in-the-wild exploitation could also be noticed quickly.

“Whereas this vulnerability isn’t on the extent of the Log4j flaws, it serves as a reminder of the availability chain dangers by using open-source software program,” Narang stated.

Associated: VMware Patches Code Execution Vulnerability in vCenter Server

Associated: Exploit Code Printed for Essential VMware Safety Flaw

Associated: VMware NSX Information Middle Flaw Can Expose Digital Methods to Assaults

Get the Day by day Briefing

 
 
 

  • Most Latest
  • Most Learn
  • VMware Patches Essential Vulnerability in Finish-of-Life Product
  • Drizly Agrees to Tighten Information Safety After Alleged Breach
  • Leveraging Managed Providers to Optimize Your Menace Intelligence Program Throughout an Financial Downturn
  • Spyderbat Raises $10 Million for Cloud and Container Safety Platform
  • Google Pays Out Over $50,000 for Vulnerabilities Patched by Chrome 107
  • Microsoft M12 Leads $25 Million Valence Safety Sequence A
  • Information Breach Victims Sue Rhode Island Transit Company, Insurer
  • Information Breach at Australian Well being Insurer Impacts Four Million Prospects; May Value $35M
  • OpenSSL to Patch First Essential Vulnerability Since 2016
  • Cisco Confirms In-the-Wild Exploitation of Two VPN Vulnerabilities

On the lookout for Malware in All of the Unsuitable Locations?

First Step For The Web’s subsequent 25 years: Including Safety to the DNS

Tattle Story: What Your Laptop Says About You

Be in a Place to Act By means of Cyber Situational Consciousness

Report Reveals Closely Regulated Industries Letting Social Networking Apps Run Rampant

2010, A Nice Yr To Be a Scammer.

Do not Let DNS be Your Single Level of Failure

The right way to Determine Malware in a Blink

Defining and Debating Cyber Warfare

The 5 A’s that Make Cybercrime so Engaging

The right way to Defend In opposition to DDoS Assaults

Safety Budgets Not in Line with Threats

Anycast – Three Causes Why Your DNS Community Ought to Use It

The Evolution of the Prolonged Enterprise: Safety Methods for Ahead Pondering Organizations

Utilizing DNS Throughout the Prolonged Enterprise: It’s Dangerous Enterprise

author-Orbit Brain
Orbit Brain
Orbit Brain is the senior science writer and technology expert. Our aim provides the best information about technology and web development designing SEO graphics designing video animation tutorials and how to use software easy ways
and much more. Like Best Service Latest Technology, Information Technology, Personal Tech Blogs, Technology Blog Topics, Technology Blogs For Students, Futurism Blog.

Cyber Security News Related Articles