First published: Mon Aug 30 2021(Updated: )
The vRealize Operations Manager API (8.x prior to 8.5) contains a Server Side Request Forgery in an end point. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack leading to information disclosure.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<=3.10.2.1 | |
VMware Cloud Foundation | >=4.0<=4.2.1 | |
Vmware Vrealize Operations Manager | >=8.0.0<8.5.0 | |
Vmware Vrealize Operations Manager | =7.5.0 | |
Vmware Vrealize Suite Lifecycle Manager | >=8.0<=8.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22026 is a vulnerability in the vRealize Operations Manager API (8.x prior to 8.5) that allows an unauthenticated malicious actor to perform a Server Side Request Forgery attack leading to information disclosure.
The severity of CVE-2021-22026 is high with a severity value of 7.5.
CVE-2021-22026 affects VMware Cloud Foundation versions 3.0 to 3.10.2.1, VMware Cloud Foundation versions 4.0 to 4.2.1, vRealize Operations Manager versions 8.0.0 to 8.5.0, and vRealize Operations Manager version 7.5.0.
An attacker with network access to the vRealize Operations Manager API can exploit CVE-2021-22026 by performing a Server Side Request Forgery attack.
Yes, VMware has released a security advisory with mitigation steps for CVE-2021-22026. Please refer to the reference link for more information.