First published: Wed Dec 14 2022(Updated: )
vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. A malicious actor with network access to the vRNI REST API can execute commands without authentication.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Vrealize Network Insight | =6.2.0 | |
Vmware Vrealize Network Insight | =6.3.0 | |
Vmware Vrealize Network Insight | =6.4.0 | |
Vmware Vrealize Network Insight | =6.5.1 | |
Vmware Vrealize Network Insight | =6.6.0 | |
Vmware Vrealize Network Insight | =6.7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-31702 is a command injection vulnerability in vRealize Network Insight (vRNI) REST API.
CVE-2022-31702 has a severity rating of 9.8, which is considered critical.
CVE-2022-31702 allows malicious actors with network access to the vRNI REST API to execute commands without authentication.
vRealize Network Insight versions 6.2.0, 6.3.0, 6.4.0, 6.5.1, 6.6.0, and 6.7.0 are affected by CVE-2022-31702.
To fix CVE-2022-31702, it is recommended to apply the necessary security patches provided by VMware. Refer to the VMware security advisory for more details.