VMware remote access tool gets three critical fixes, so update now

Epitome: MaboHH / Getty Images

VMware is urging its vCenter users to update vCenter Server versions vi.5, six.seven, and 7.0 immediately, after a pair of vulnerabilities were reported privately to the company.

The most pressing is CVE-2021-21985, which relates to a remote code execution vulnerability in a vSAN plugin enabled by default in vCenter that an assaulter could use to run whatever they wished on the underlying host motorcar, provided they tin can access port 443.

Even if users practice non use vSAN, they are likely to be affected because the vSAN plugin is enabled by default.

“The vSphere Client (HTML5) contains a remote code execution vulnerability due to lack of input validation in the Virtual SAN Health Bank check plug-in which is enabled past default in vCenter Server,” VMware described the consequence in an advisory.

In its FAQ, VMware warned that since the attacker only needs to exist able to hitting port 443 to conduct the assail, firewall controls are the last line of defence for users.

“Organisations who have placed their vCenter Servers on networks that are directly accessible from the internet may not accept that line of defence and should audit their systems for compromise,” the company states.

“They should also accept steps to implement more perimeter security controls (firewalls, ACLs, etc.) on the direction interfaces of their infrastructure.”

To gear up the event, VMware recommends users update vCenter, or if not possible, the visitor has provided instructions on how to disable vCenter Server plugins.

“While vSAN will go along operating, manageability and monitoring are not possible while the plugin is disabled. A client who is using vSAN should only consider disabling the plugin for brusk periods of time, if at all,” VMware warned.

Users are warned that the patches provide amend plugin authentication, and some third-party plugins may interruption and users are directed to contact the plugin vendor.

“This needs your immediate attention if y’all are using vCenter Server,” VMware said in a blog post.

“In this era of ransomware it is safest to assume that an attacker is already within the network somewhere, on a desktop and perhaps even in control of a user account, which is why we strongly recommend declaring an emergency change and patching as soon every bit possible.”

Even having perimeter controls may non exist enough, and VMware suggested users look at better network separation.

“Ransomware gangs take repeatedly demonstrated to the globe that they are able to compromise corporate networks while remaining extremely patient, waiting for a new vulnerability in order to attack from inside a network,” it said.

“This is not unique to VMware products, only it does inform our suggestions here. Organisations may want to consider boosted security controls and isolation between their IT infrastructure and other corporate networks as part of an attempt to implement modern zero-trust security strategies.”

The second vulnerability, CVE-2021-21986, would allow an attacker to perform actions allowed by plugins without authentication.

“The vSphere Client (HTML5) contains a vulnerability in a vSphere authentication machinery for the Virtual SAN Health Check, Site Recovery, vSphere Lifecycle Manager, and VMware Deject Director Availability plug-ins,” VMware said.

In terms of CVSSv3 scores, CVE-2021-21985 hit an 9.8, while CVE-2021-21986 was scored equally vi.v.

Earlier this yr, a pair of ESXi vulnerabilities were being used ransomware gangs to accept over virtual machines and encrypt virtual hard drives.

Related Coverage

  • Dell divests VMware: Investors cheer, just what does it mean for customers?
  • VMware patches critical vRealize Operations platform vulnerabilities
  • More than 6,700 VMware servers exposed online and vulnerable to major new bug
  • Ransomware gangs are abusing VMWare ESXi exploits to encrypt virtual hard disks
  • VMware’south blockchain platform is ready for the enterprise

Source: https://www.zdnet.com/article/patch-immediately-vmware-warns-of-critical-remote-code-execution-holes-in-vcenter/

Check Also


Photograph Courtesy: Frank Carroll/Getty Images Nearly four decades after emerging onto the scene, Mr. T …