VMSA-2022-0025

vmware logo header

Important


VMSA-2022-0025

3.8-7.2

2022-10-06

2022-10-06 (Initial Advisory)

CVE-2022-31680, CVE-2022-31681

VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31680, CVE-2022-31681)

1. Impacted Products



  • VMware ESXi
  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)

2. Introduction



Multiple vulnerabilities in VMware ESXi and vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

 

3a. VMware vCenter Server platform services controller unsafe deserialization vulnerability (CVE-2022-31680)

Description



The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.

Known Attack Vectors



A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server. 

 

Resolution



To remediate CVE-2022-31680 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.

Workarounds



None.

Additional Documentation



None.

Notes



This issue impacts only vCenter Server 6.5 with an external PSC.

Acknowledgements



VMware would like to thank Marcin “Icewall” Noga of Cisco Talos for reporting this vulnerability to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
vCenter Server
7.0
Any
CVE-2022-31680
N/A
N/A

Not impacted
N/A
N/A
vCenter Server
6.7
Any
CVE-2022-31680
N/A
N/A

Not impacted
N/A
N/A
vCenter Server
6.5
Any
CVE-2022-31680
important

None
None

3b. VMware ESXi null-pointer dereference vulnerability (CVE-2022-31681)

Description



VMware ESXi contains a null-pointer deference vulnerability. VMware has evaluated the severity of this issue to be in the Low severity range with a maximum CVSSv3 base score of 3.8.

Known Attack Vectors



A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.

 

 

Resolution



To remediate CVE-2022-31681 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.

Workarounds



None.

Additional Documentation



None.

Notes



None.

Acknowledgements



VMware would like to thank VictorV (Tangtianwen) of Cyber Kunlun Lab for reporting this vulnerability to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
ESXi
7.0
Any
CVE-2022-31681
low

None
None
ESXi
6.7
Any
CVE-2022-31681
low

None
None
ESXi
6.5
Any
CVE-2022-31681
low

None
None

Impacted Product Suites that Deploy Response Matrix 3b Components:

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
Cloud Foundation (ESXi)
4.x
Any
CVE-2022-31681
low

None
None
Cloud Foundation (ESXi)
3.x
Any
CVE-2022-31681
low

None
None

4. References

5. Change Log



2022-10-06 VMSA-2022-0025
Initial security advisory.

6. Contact



E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:  

security-announce@lists.vmware.com  

bugtraq@securityfocus.com  

fulldisclosure@seclists.org 

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055 

 

VMware Security Advisories

https://www.vmware.com/security/advisories 

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html 

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html 

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security 

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2022 VMware Inc. All rights reserved.
 

Read full article (vmware.com)

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Leave a Reply
Previous Post
citrix logo header

Troubleshooting Automated Configuration for Citrix Virtual Apps and Desktops

Next Post
citrix logo header

VDR Overutilization FAQ

Related Posts