Moderate
VMSA-2022-0018
5.3
2022-07-12
2022-07-12 (Initial Advisory)
CVE-2022-22982
VMware vCenter Server updates address a server-side request forgery vulnerability (CVE-2022-22982)
1. Impacted Products
- VMware vCenter Server (vCenter Server)
- VMware Cloud Foundation (Cloud Foundation)
2. Introduction
A server-side request forgery (SSRF) vulnerability in VMware vCenter Server was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products.
3. vCenter Server SSRF vulnerability (CVE-2022-22982)
Description
The vCenter Server contains a server-side request forgery (SSRF) vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.3.
Known Attack Vectors
A malicious actor with network access to 443 on the vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.
Resolution
To remediate CVE-2022-22982 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.
Workarounds
None.
Additional Documentation
None.
Notes
None.
Acknowledgements
VMware would like to thank pwnull for reporting this issue to us.
Response Matrix:
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
vCenter Server | 7.0 | Any | CVE-2022-22982 | moderate
| None | None | ||
vCenter Server | 6.7 | Any | CVE-2022-22982 | moderate
| None | None | ||
vCenter Server | 6.5 | Any | CVE-2022-22982 | moderate
| None | None |
Impacted Product Suites that Deploy Response Matrix Components:
4. References
Fixed Version(s) and Release Notes:
vCenter Server 7.0 U3f
Downloads and Documentation:
https://customerconnect.vmware.com/downloads/details?downloadGroup=VC70U3F&productId=974&rPId=90206
https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3f-release-notes.html
vCenter Server 6.7 U3r
Downloads and Documentation:
https://customerconnect.vmware.com/en/downloads/details?downloadGroup=VC67U3R&productId=742&rPId=78421
https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vcenter-server-67u3r-release-notes.html
vCenter Server 6.5 U3t
Downloads and Documentation:
https://customerconnect.vmware.com/downloads/details?downloadGroup=VC65U3T&productId=614&rPId=74057
https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vcenter-server-65u3t-release-notes.html
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22982
FIRST CVSSv3 Calculator:
CVE-2022-22982: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N
5. Change Log
2022-07-12 VMSA-2022-0018
Initial security advisory.
6. Contact
E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
E-mail: security@vmware.com
PGP key at:
VMware Security Advisories
https://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Copyright 2022 VMware Inc. All rights reserved.
Read full article (vmware.com)
All content and images belong to their respected owners, this article is curated for informational purposes only.