Sunday, February 5, 2023
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory
  • Login
  • Register
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
No Result
View All Result
Cloud7 News
No Result
View All Result

Home > Cybersecurity > A critical vulnerability is found in VMware Cloud Director

A critical vulnerability is found in VMware Cloud Director

VMware Cloud Director has a critical bug allowing remote code execution with a CVSS score of 9.1.


Rusen Gobel Rusen Gobel
April 15, 2022
3 min read
A critical vulnerability found in VMware Cloud Director

VMware has published an advisory regarding a recently discovered vulnerability that allows remote code execution on its Cloud Director product. The flaw can be tracked with CVE-2022-22966 and it has a CVSS score of 9.1, which makes the flaw a critical one.

Patches are ready

The vulnerability affects only VMware Cloud Director with 10.3.x, 10.2.x, and 10.1.x versions. VMware has released a patch to fix this flaw, updating the versions to 10.3.3, 10.2.2.3, and 10.1.4.1 respectively. The company urges the administrators to apply the patches immediately since the attackers might gain access to sensitive data by exploiting it. In addition, it is possible to take over private clouds within an entire infrastructure by utilizing the vulnerability.

The company has also provided a workaround solution where updating the VMware Cloud Director instances is not possible. The solution does not affect any of the functionality of Cloud Director. Administrators can simply follow the steps below to secure their systems:

1- SSH to any Cell within the Server Group.

2- Download the WA_CVE-2022-22966.sh script to the /tmp directory.

3- Modify the permissions of the file to allow execution.

chown root:vcloud /tmp/WA_CVE-2022-22966.sh
chmod 740 /tmp/WA_CVE-2022-22966.sh

4- Navigate to the /tmp directory of the Cell.

cd /tmp

5- Execute the script.

./WA_CVE-2022-22966.sh

6- Ensure the services on the current Cloud Director Cell have restarted before proceeding with running the script on subsequent Cells.

tail -f /opt/vmware/vcloud-director/logs/cell.log

7- To verify the patch has correctly been applied, you can check the existing config and also the runtime settings of the Cloud Director Cell. To check the Config, run the following command:

grep trustSerialData /opt/vmware/vcloud-director/bin/vmware-vcd-cell-common

8- To check the runtime settings, you can do so from any system that can connect to the Cells JMX port (8999) using either jConsole or jmxterm. To use jConsole, open the jConsole client and connect to the Cell, click on the MBeans tab in the top navigation bar and follow the navigation tree: java.lang > Runtime > Attributes  > SystemProperties. Double click javax.management.openmbean.TabularDataSupport, scroll until you find com.sun.jndi.ldap.object.trustSerialData, and the key, value pair must be present and the value must be false.

To use jmxterm, you will need to download it here

Run the following command at the jmxterm command line, filling in the correct parameters

echo "get --domain java.lang -b type=Runtime SystemProperties" | java -jar <path to jmxterm-1.0.2-uber.jar> -n -l <Cell FQDN>:8999 -u <administrator> -p '<administrator password>' | /bin/grep -A2 com.sun.jndi.ldap.object.trustSerialData

Like with jConsole, you will get a key, value pair, and you should expect to see a false value. Running the script again post the 1st execution will report that the cell is “Protected”

9- SSH to the remaining Cells serially and repeat steps 3-5 until all Cells in the Server Group are patched.

Click here to read the full advisory for VMware Cloud Director vulnerability

See more Cybersecurity News


Tags: VMwareVulnerability
Rusen Gobel

Rusen Gobel

Rusen Gobel is a news editor at Cloud7 News. With more than 10 years of experience, Rusen worked as a hardware and software news editor for technology sites such as Shiftdelete, Teknokolis, Hardware Plus, BT Haber. In addition, Rusen publishes consumer product reviews on his YouTube channel. While consumer electronics has been his main focus for years, now Rusen is more interested in WordPress and software development. He had contributed different web application projects in his professional career. Rusen had graduated from Istanbul University, department of Computer Engineering. Rusen has a very high passion for learning and writing for every kind of technology. That's why he has been working as a tech editor for more than ten years on several different technology magazines and online news portals.

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

I agree to the Terms & Conditions and Privacy Policy.

Next Post
Windows has a critical remote execution vulnerability

Windows has a critical remote code execution vulnerability

Related News

LockBit encryptor source code is updated

LockBit encryptor source code is updated

February 3, 2023 4:40 pm
Fortinet is expanding its SOC offerings portfolio

Fortinet is expanding its SOC offerings portfolio

February 3, 2023 2:00 pm
Radware announces a new partner program

Radware announces a new partner program

February 3, 2023 1:30 pm
APTs are looking for developers to hire with hefty paychecks

APTs are looking for developers to hire with hefty paychecks

February 1, 2023 2:30 pm
Get free daily newsletters from Cloud7 News Get the Cloud7 Newsletter
Select list(s):

Check your inbox or spam folder to confirm your subscription.

By subscribing, you agree to our
Copyright Policy and Privacy Policy

Get the free newsletter

Subscribe to receive the latest IT business updates straight to your inbox.

Select list(s):

Check your inbox or spam folder to confirm your subscription.

Editor's Choice

What’s new in Linux kernel 6.2 rc6?

10 Best Web Hosting Services of 2023

Ubuntu 22.04 LTS is available for download. What is new?

CERN and Fermilab recommend AlmaLinux

7 best hosting control panels of 2023

How to update Linux Kernel without rebooting?

7 best Linux mail servers of 2023

7 best cPanel alternatives for 2023

7 best Linux web browsers for 2023

7 best CentOS alternatives

7 best Linux server distros of 2023

Interview with Igor Seletskiy on AlmaLinux

How to create a VM on VMware Workstation

Recent News

  • Weekly round-up: 30 January – 3 February
  • What is Deep Learning?
  • What is GitHub Copilot?
  • Cloud7 Expert Series: Dennis Kittrell from CloudLinux
  • Best Ubuntu alternatives for desktop of 2023

Cloud7 News
Cloud7 is a news source that publishes the latest news, reviews, comparisons, opinions, and exclusive interviews to help tech users of high-experience levels in the IT industry.

EXPLORE

  • Web Hosting
  • Cloud Computing
  • Data Center
  • Cybersecurity
  • Linux
  • Network/Internet
  • Software
  • Hardware
  • How-Tos
  • Troubleshooting

RESOURCES

  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

Get the Cloud7 Newsletter

Get FREE daily newsletters from Cloud7 delivering the latest news and reviews.

  • About
  • Privacy & Policy
  • Copyright Policy
  • Contact

© 2023, Cloud7 News. All rights reserved.

No Result
View All Result
  • Cloud Computing
  • Web Hosting
  • Data Center
  • Linux
  • Cybersecurity
  • More
    • Network/Internet
    • Windows
    • Software
    • Hardware
    • Blockchain
    • Policy/Legislation
    • How-Tos
    • Troubleshooting
  • Events
  • Interviews
  • Jobs
  • Opinion
  • Whitepapers
  • Glossary
  • Community Forum
  • Web Hosting Directory

© 2023, Cloud7 News. All rights reserved.

Welcome Back!

Sign In with Facebook
Sign In with Google
Sign In with Linked In
OR

Login to your account below

Forgotten Password? Sign Up

Create New Account!

Sign Up with Facebook
Sign Up with Google
Sign Up with Linked In
OR

Fill the forms below to register

*By registering into our website, you agree to the Terms & Conditions and Privacy Policy.
All fields are required. Log In

Retrieve your password

Please enter your username or email address to reset your password.

Log In
This website uses cookies. By continuing to use this website you are giving consent to cookies being used. Visit our Privacy and Cookie Policy.