First published: Mon Aug 30 2021(Updated: )
The vRealize Operations Manager API (8.x prior to 8.5) contains a broken access control vulnerability leading to unauthenticated API access. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can add new nodes to existing vROps cluster.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<=3.10.2.1 | |
VMware Cloud Foundation | >=4.0<=4.2.1 | |
Vmware Vrealize Operations Manager | >=8.0.0<8.5.0 | |
Vmware Vrealize Operations Manager | =7.5.0 | |
Vmware Vrealize Suite Lifecycle Manager | >=8.0<=8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2021-22025.
The severity rating of CVE-2021-22025 is high with a severity value of 7.5.
The affected software includes VMware Cloud Foundation (versions 3.0 to 3.10.2.1), VMware vRealize Operations Manager (versions 8.0.0 to 8.5.0), and VMware vRealize Suite Lifecycle Manager (versions 8.0 to 8.2).
CVE-2021-22025 is a broken access control vulnerability in the vRealize Operations Manager API (8.x prior to 8.5) that allows unauthenticated API access and the ability to add new nodes to an existing vROps cluster.
Yes, VMware has released a security advisory (VMSA-2021-0018) that includes a fix for CVE-2021-22025. It is recommended to apply the necessary patches or updates provided by VMware.