First published: Fri Oct 29 2021(Updated: )
Under certain circumstances, when manipulating the Windows registry, InstallBuilder uses the reg.exe system command. The full path to the command is not enforced, which results in a search in the search path until a binary can be identified. This makes the installer/uninstaller vulnerable to Path Interception by Search Order Hijacking, potentially allowing an attacker to plant a malicious reg.exe command so it takes precedence over the system command. The vulnerability only affects Windows installers.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Installbuilder | <21.6.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2021-22037 is classified as Medium, indicating potential security risks that may affect system integrity.
To mitigate CVE-2021-22037, ensure that you are using VMware InstallBuilder version 21.6.0 or later, as this version addresses the vulnerability.
CVE-2021-22037 affects VMware InstallBuilder versions prior to 21.6.0 installed on Windows operating systems.
CVE-2021-22037 is not considered remotely exploitable as it requires local access to the affected installer/uninstaller.
Failure to address CVE-2021-22037 may result in unauthorized manipulation of the Windows registry, potentially leading to system compromise.