First published: Wed Nov 10 2021(Updated: )
The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism. A malicious actor with non-administrative access to vCenter Server may exploit this issue to elevate privileges to a higher privileged group.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=3.0<=3.10.2.2 | |
VMware vCenter Server | =6.5 | |
VMware vCenter Server | =6.7 | |
VMware vCenter Server | =7.0 | |
VMware Cloud Foundation | >=4.0<=4.1.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-22048 is a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism in vCenter Server.
CVE-2021-22048 has a severity rating of 8.8 (high).
VMware Cloud Foundation versions between 3.0 and 3.10.2.2, and vCenter Server versions 6.5, 6.7, and 7.0 are affected by CVE-2021-22048.
A malicious actor with non-administrative access to vCenter Server can exploit CVE-2021-22048 to elevate privileges to a higher privileged group.
Yes, you can find more information about CVE-2021-22048 in the following references: [Packet Storm Security Advisory 2022-0025.2](http://packetstormsecurity.com/files/167733/VMware-Security-Advisory-2022-0025.2.html), [Packet Storm Security Advisory 2021-0025.3](http://packetstormsecurity.com/files/167795/VMware-Security-Advisory-2021-0025.3.html), and [VMware Security Advisory VMSA-2021-0025](https://www.vmware.com/security/advisories/VMSA-2021-0025.html).