VMware Security Advisory VMSA-2021-0027

vmware logo header

VMware have released more fixes for multiple vulnerabilities that have been privately reported to them within vCenter. They have provided patches to address the issues found. We strongly advise customers to apply the patches as soon as possible.

Advisory ID: VMSA-2021-0027

CVSSv3 Range: 6.5-7.5

Issue Date: 2021-11-23

Updated On: 2021-11-23 (Initial Advisory)

CVE(s): CVE-2021-21980, CVE-2021-22049

Synopsis: VMware vCenter Server updates address arbitrary file read and SSRF vulnerabilities (CVE-2021-21980, CVE-2021-22049)

1. Impacted Products

  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)

2. Introduction

Multiple vulnerabilities in VMware vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

3a. vCenter Server updates address arbitrary file read vulnerability in the vSphere Web Client (CVE-2021-21980)

Description

The vSphere Web Client (FLEX/Flash) contains an unauthorized arbitrary file read vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5.

Known Attack Vectors

A malicious actor with network access to port 443 on vCenter Server may exploit this issue to gain access to sensitive information.

Resolution

To remediate CVE-2021-21980 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds

None.

Additional Documentation

None.

Notes

vCenter Server vSphere Web Client (FLEX/Flash) is not available in vCenter Server 7.x, therefore this issue is not applicable to vCenter Server 7.x release line.

Acknowledgements

VMware would like to thank ch0wn of Orz lab for reporting this issue to us.

Response Matrix:

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
vCenter Server7.0AnyCVE-2021-21980N/AN/AUnaffectedN/AN/A
vCenter Server6.7AnyCVE-2021-219807.5Important
 
6.7 U3pNoneNone
vCenter Server6.5AnyCVE-2021-219807.5Important
 
6.5 U3rNoneNone

Impacted Product Suites that Deploy Response Matrix 3a Components:

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
Cloud Foundation (vCenter Server)4.xAnyCVE-2021-21980N/AN/AUnaffectedN/AN/A
Cloud Foundation (vCenter Server)3.xAnyCVE-2021-219807.5ImportantPatch PendingNoneNone

3b. vCenter Server updates address SSRF vulnerability in the vSphere Web Client (CVE-2021-22049)

Description

The vSphere Web Client (FLEX/Flash) contains an SSRF (Server Side Request Forgery) vulnerability in the vSAN Web Client (vSAN UI) plug-in. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.5.

Known Attack Vectors

A malicious actor with network access to port 443 on vCenter Server may exploit this issue by accessing a URL request outside of vCenter Server or accessing an internal service.

Resolution

To remediate CVE-2021-22049 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds

None.

Additional Documentation

None.

Notes


vCenter Server vSphere Web Client (FLEX/Flash) is not available in vCenter Server 7.x, therefore this issue is not applicable to vCenter Server 7.x release line.

Acknowledgements

VMware would like to thank lmagiczero for reporting this issue to us.

Response Matrix:

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
vCenter Server7.0AnyCVE-2021-22049N/AN/AUnaffectedN/AN/A
vCenter Server6.7AnyCVE-2021-220496.5Moderate6.7 U3pNoneNone
vCenter Server6.5AnyCVE-2021-220496.5Moderate6.5 U3rNoneNone

Impacted Product Suites that Deploy Response Matrix 3b Components:

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
Cloud Foundation (vCenter Server)4.xAnyCVE-2021-22049N/AUnaffectedKB85254N/AN/A
Cloud Foundation (vCenter Server)3.xAnyCVE-2021-22049ModeratePatch PendingKB85254NoneNone

4. References

Fixed Version(s) and Release Notes:

vCenter Server 6.7 U3p
Downloads and Documentation:
https://customerconnect.vmware.com/en/downloads/details?downloadGroup=VC67U3P&productId=742&rPId=78421
https://docs.vmware.com/en/VMware-vSphere/6.7/rn/vsphere-vcenter-server-67u3p-release-notes.html

vCenter Server 6.5 U3r
Downloads and Documentation:
https://customerconnect.vmware.com/downloads/details?downloadGroup=VC65U3R&productId=614&rPId=74057
https://docs.vmware.com/en/VMware-vSphere/6.5/rn/vsphere-vcenter-server-65u3r-release-notes.html

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-21980 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-22049

FIRST CVSSv3 Calculator:
CVE-2021-21980: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CVE-2021-22049: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:L/I:L/A:L

5. Change Log

2021-11-23 VMSA-2021-0027

Initial security advisory.

Total
0
Shares
Leave a Reply
Previous Post
exchange server header

Microsoft Exchange Server November Security Update

Next Post
proxmox logo header

Proxmox 7.1 Released

Related Posts