Vulnerability Name: | CVE-2021-22025 (CCN-208127) |
Assigned: | 2021-08-24 |
Published: | 2021-08-24 |
Updated: | 2022-02-01 |
Summary: | The vRealize Operations Manager API (8.x prior to 8.5) contains a broken access control vulnerability leading to unauthenticated API access. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can add new nodes to existing vROps cluster.
|
CVSS v3 Severity: | 7.5 High (CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N) 6.5 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): None Integrity (I): High Availibility (A): None | 8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L) 7.5 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:L/A:L/E:U/RL:O/RC:C)Exploitability Metrics: | Attack Vector (AV): Network Attack Complexity (AC): Low Privileges Required (PR): None User Interaction (UI): None | Scope: | Scope (S): Unchanged
| Impact Metrics: | Confidentiality (C): High Integrity (I): Low Availibility (A): Low |
|
CVSS v2 Severity: | 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Authentication (Au): None | Impact Metrics: | Confidentiality (C): None Integrity (I): Partial Availibility (A): None | 9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:P/A:P)Exploitability Metrics: | Access Vector (AV): Network Access Complexity (AC): Low Athentication (Au): None
| Impact Metrics: | Confidentiality (C): Complete Integrity (I): Partial Availibility (A): Partial |
|
Vulnerability Type: | CWE-287
|
Vulnerability Consequences: | Bypass Security |
References: | Source: MITRE Type: CNA CVE-2021-22025
Source: XF Type: UNKNOWN vmware-cve202122025-sec-bypass(208127)
Source: CCN Type: VMware Security Advisory VMSA-2021-0018 VMware vRealize Operations updates address multiple security vulnerabilities (CVE-2021-22022, CVE-2021-22023, CVE-2021-22024, CVE-2021-22025, CVE-2021-22026, CVE-2021-22027)
Source: MISC Type: Patch, Vendor Advisory https://www.vmware.com/security/advisories/VMSA-2021-0018.html
|
Vulnerable Configuration: | Configuration 1: cpe:/a:vmware:cloud_foundation:*:*:*:*:*:*:*:* (Version >= 3.0 and <= 3.10.2.1)OR cpe:/a:vmware:cloud_foundation:*:*:*:*:*:*:*:* (Version >= 4.0 and <= 4.2.1)OR cpe:/a:vmware:vrealize_operations_manager:7.5.0:*:*:*:*:*:*:*OR cpe:/a:vmware:vrealize_operations_manager:*:*:*:*:*:*:*:* (Version >= 8.0.0 and < 8.5.0)OR cpe:/a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:* (Version >= 8.0 and <= 8.2) Configuration CCN 1: cpe:/a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*OR cpe:/a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*
Denotes that component is vulnerable |
BACK |