First published: Wed Feb 16 2022(Updated: )
VMware ESXi contains an unauthorized access vulnerability due to VMX having access to settingsd authorization tickets. A malicious actor with privileges within the VMX process only, may be able to access settingsd service running as a high privileged user.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=4.0<4.4 | |
VMware ESXi | =7.0-update_1 | |
VMware ESXi | =7.0-update_2 | |
VMware ESXi | =7.0-update_3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this unauthorized access vulnerability in VMware ESXi is CVE-2021-22042.
The severity of CVE-2021-22042 is high with a score of 7.8.
The vulnerability affects VMware Cloud Foundation versions 4.0 to 4.4, and VMware ESXi versions 7.0 update 1 to update 3.
The vulnerability allows unauthorized access because the VMX process in VMware ESXi has access to settingsd authorization tickets, which can be exploited by a malicious actor with privileges within the VMX process.
Yes, VMware has released a security advisory (VMSA-2022-0004) which provides details on the fix for CVE-2021-22042.