{"id":147,"date":"2022-04-15T21:53:11","date_gmt":"2022-04-15T19:53:11","guid":{"rendered":"https:\/\/linowebserver.org\/?p=147"},"modified":"2022-04-16T00:00:29","modified_gmt":"2022-04-15T22:00:29","slug":"critical-vmware-cloud-director-bug-could-hackers-takeover-entire-cloud-infrastructur","status":"publish","type":"post","link":"https:\/\/linowebserver.org\/index.php\/2022\/04\/15\/critical-vmware-cloud-director-bug-could-hackers-takeover-entire-cloud-infrastructur\/","title":{"rendered":"Critical VMware Cloud Director Bug could Hackers takeover entire Cloud Infrastructur"},"content":{"rendered":"\n<p>Cloud computing and virtualization technology firm VMWare on Thursday rolled out an update to resolve a critical security flaw in its Cloud Director product that could be weaponized to launch remote code execution attacks.<\/p>\n\n\n\n<p>The issue, assigned the identifier <strong>CVE-2022-22966<\/strong>, has a CVSS score of 9.1 out of a maximum of 10. VMware credited security researcher Jari J\u00e4\u00e4skel\u00e4 with reporting the flaw.<\/p>\n\n\n\n<p>&#8222;An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server,&#8220; VMware <a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2022-0013.html\" rel=\"noreferrer noopener\" target=\"_blank\">said<\/a> in an advisory.<\/p>\n\n\n\n<p>VMware Cloud Director, formerly known as vCloud Director, is used by many well-known cloud providers to operate and manage their cloud infrastructures and gain visibility into datacenters across sites and geographies.<\/p>\n\n\n\n<p>The vulnerability could, in other words, end up allowing attackers to gain access to sensitive data and take over private clouds within an entire infrastructure.<\/p>\n\n\n\n<p>Affected versions include 10.1.x, 10.2.x, and 10.3.x, with fixes available in versions 10.1.4.1, 10.2.2.3, and 10.3.3. The company has also published <a href=\"https:\/\/kb.vmware.com\/s\/article\/88176\" rel=\"noreferrer noopener\" target=\"_blank\">workarounds<\/a> that can be followed when upgrading to a recommended version is not an option.<\/p>\n\n\n\n<p>The patches arrive a day after exploits for another recently fixed critical flaw in VMware Workspace ONE Access were detected in the wild.<\/p>\n\n\n\n<p>The flaw (<a href=\"https:\/\/thehackernews.com\/2022\/04\/vmware-releases-critical-patches-for.html\" rel=\"noreferrer noopener\" target=\"_blank\">CVE-2022-22954<\/a>) relates to a remote code execution vulnerability that stems from server-side template injection in VMware Workspace ONE Access and Identity Manager.<\/p>\n\n\n\n<p>With VMware products often becoming a lucrative target for threat actors, the update adds to the urgency for organizations to apply necessary mitigations to prevent potential threats.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Cloud computing and virtualization technology firm VMWare on Thursday rolled out an update to resolve a critical security flaw in its Cloud Director product that could be weaponized to launch remote code execution attacks. The issue, assigned the identifier CVE-2022-22966, has a CVSS score of 9.1 out of a maximum of 10. VMware credited security [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[4,11],"tags":[5,56,57],"class_list":["post-147","post","type-post","status-publish","format-standard","hentry","category-cve","category-cybersecurity","tag-cve","tag-cve-2022-22966","tag-vmware"],"_links":{"self":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts\/147","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/comments?post=147"}],"version-history":[{"count":1,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts\/147\/revisions"}],"predecessor-version":[{"id":148,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/posts\/147\/revisions\/148"}],"wp:attachment":[{"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/media?parent=147"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/categories?post=147"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/linowebserver.org\/index.php\/wp-json\/wp\/v2\/tags?post=147"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}