Jump to content

VMware fixes authentication bypass in data center security software - Piracy News and Crypto Updates - InviteHawk - Your Only Source for Free Torrent Invites

Buy, Sell, Trade or Find Free Torrent Invites for Private Torrent Trackers Such As redacted, blutopia, losslessclub, femdomcult, filelist, Chdbits, Uhdbits, empornium, iptorrents, hdbits, gazellegames, animebytes, privatehd, myspleen, torrentleech, morethantv, bibliotik, alpharatio, blady, passthepopcorn, brokenstones, pornbay, cgpeers, cinemageddon, broadcasthenet, learnbits, torrentseeds, beyondhd, cinemaz, u2.dmhy, Karagarga, PTerclub, Nyaa.si, Polishtracker etc.

VMware fixes authentication bypass in data center security software


Recommended Posts

VMware has addressed a critical vulnerability in the VMware Carbon Black Cloud Workload appliance that could allow attackers to bypass authentication after exploiting vulnerable servers.

VMware Carbon Black Cloud Workload is a Linux data center security software designed to protect workloads running in virtualized environments.

It also bundles endpoint protection capabilities, including endpoint detection and response (EDR), next-gen antivirus, and real-time threat hunting.

This security vulnerability impacts VMware Carbon Black Cloud Workload appliance version 1.0.1 and earlier.

Admin interface exploitable for auth bypass

Attackers can exploit the security vulnerability tracked as CVE-2021-21982 by manipulating an administrative interface URL to obtain valid authentication tokens.

Using this auth token, the malicious actor can then access the administration API of unpatched VMware Carbon Black Cloud Workload appliances.

Successfully exploiting the security flaw enables the attacker to view and modify administrative configuration settings.

CVE-2021-21982 can be exploited by attackers remotely without requiring authentications or user interaction in low complexity attacks.

VMware evaluated the security bug as critical severity, assigning it a CVSSv3 base score of 9.1/10.

The vulnerability was discovered and privately reported to VMware by Positive Technologies web security researcher Egor Dimitrenko.

Mitigation also available

VMware has also issued mitigation information for admins who can't immediately patch their VMware Carbon Black Cloud Workload appliances.

Removing remote access to the appliance's local admin interface is enough to remove the attack vector as the company advises.

"VMware best practices recommend implementing network controls to limit access to the local administrative interface of the appliance," the company said.

"Unrestricted network access to this interface is not required for the regular operation of the product."

On Tuesday, VMware patched two other vulnerabilities found by Dimitrenko in the vRealize Operations IT operations management platform.

When chained together, the two bugs lead to pre-auth remote code execution (RCE) on vulnerable vRealize Operations servers.

Link to comment
Share on other sites

Avoid unnecessary posts such as 'Thank you', 'Welcome', etc. Such posts will be deleted and user will be warned if it happens again. If caught spamming, the following actions are applicable -

  • First time - Warning
  • Second time - 5000 Points will be deducted
  • Third time - Ban for 7 days
  • Fourth time - Permanent Ban

If the post helped you, reward the user by reacting to the post like this -

1.jpg

Link to comment
Share on other sites

The last post in this topic was made more than 14 days ago. Only post in this topic if you have something valuable to add. Irrelevant posts are not allowed and you will be warned/banned for spamming old topics.

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Read this before posting -
  • Only post if you have something valuable to contribute.
  • Avoid unnecessary posts such as 'Thank you', 'Welcome', etc. Such posts will be deleted and you will be warned if it happens again.
  • If the post helped you, reward the user by reacting to the post like this -                      1.jpg
Guest
Unfortunately, your content contains terms that we do not allow. Please edit your content to remove the highlighted words below.
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.

  • Customer Reviews

  • Similar Topics

×
×
  • Create New...

Important Information

By using this site, you agree to our Terms of Use.