VMware remote code execution vulnerability: What you need to know
As of December 10th, 2021, a critical remote code execution vulnerability has been reported in VMware products. The vulnerability, identified as CCVE-2021-44228, has received a high severity score of 10 out of 10 on the CVSS vulnerability scale. This means that the vulnerability can be easily exploited by attackers to gain control of affected systems.
The vulnerability is caused by a lack of proper input validation in the VMware product’s web interface, which allows an attacker to inject malicious code into the system. The attacker can then execute the code with elevated privileges, allowing them to take full control of the system.
VMware has released a response matrix for this vulnerability, which includes information on affected products and possible workarounds. However, patches are not yet available, and users are advised to upgrade their systems as soon as possible once patches become available.
The affected products include:
* vCenter Server
* ESXi
* NSX-T
* Horizon 7
The response matrix includes the following information for each product:
* Workaround: Some workarounds are available for certain products, such as disabling the web interface or restricting access to it.
* Patch: Patches are not yet available, but they will be released as soon as possible.
* Upgrade: Users are advised to upgrade their systems as soon as possible once patches become available.
It is important to note that this vulnerability can be exploited remotely, so it is essential to take immediate action to protect your system. VMware has provided a detailed advisory on the vulnerability and the response matrix, which can be found on their website.
To stay informed about the status of patches and updates for this vulnerability, it is recommended to regularly check the VMware security announcements page. Additionally, it is advised to follow best practices for securing your systems, such as keeping software up-to-date, using strong passwords, and limiting access to sensitive data.
In conclusion, the remote code execution vulnerability in VMware products is a critical issue that requires immediate attention. Users should take the necessary steps to protect their systems, such as upgrading as soon as possible once patches become available. Regularly checking the VMware security announcements page and following best practices for securing your systems can also help prevent attacks.