First published: Thu Apr 14 2022(Updated: )
An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCloud Director | >=10.1.0<10.1.4.1 | |
VMware vCloud Director | >=10.2.0<10.2.2.3 | |
VMware vCloud Director | >=10.3.0<10.3.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-22966 is a remote code execution vulnerability in VMware Cloud Director that allows an authenticated, high privileged malicious actor with network access to gain access to the server.
CVE-2022-22966 has a severity rating of 7.2, which is considered high.
VMware vCloud Director versions from 10.1.0 to 10.1.4.1, 10.2.0 to 10.2.2.3, and 10.3.0 to 10.3.3 are affected by CVE-2022-22966.
An attacker needs to be an authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider to exploit CVE-2022-22966.
Yes, VMware has released a security advisory (VMSA-2022-0013) with the necessary patches to address CVE-2022-22966.