First published: Tue Dec 18 2018(Updated: )
vRealize Operations (7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837 and 6.6.x before 6.6.1.11286876) contains a local privilege escalation vulnerability due to improper permissions of support scripts. Admin user of the vROps application with shell access may exploit this issue to elevate the privileges to root on a vROps machine. Note: the admin user (non-sudoer) should not be confused with root of the vROps machine.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Vrealize Operations | >=6.6.0<6.6.1.11286876 | |
Vmware Vrealize Operations | >=6.7.0<6.7.0.11286837 | |
Vmware Vrealize Operations | >=7.0.0<7.0.0.11287810 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for vRealize Operations is CVE-2018-6978.
The severity of CVE-2018-6978 is high.
The affected software for CVE-2018-6978 is VMware vRealize Operations 7.x before 7.0.0.11287810, 6.7.x before 6.7.0.11286837, and 6.6.x before 6.6.1.11286876.
CVE-2018-6978 is a local privilege escalation vulnerability in vRealize Operations due to improper permissions of support scripts, which allows an admin user with shell access to elevate their privileges.
Yes, you can find the references for CVE-2018-6978 at the following links: [Security Focus](http://www.securityfocus.com/bid/106242) and [VMware Security Advisories](https://www.vmware.com/security/advisories/VMSA-2018-0031.html).