First published: Thu Jun 27 2024(Updated: )
VMware Cloud Director contains an Improper Privilege Management vulnerability. An authenticated tenant administrator for a given organization within VMware Cloud Director may be able to accidentally disable their organization leading to a Denial of Service for active sessions within their own organization's scope.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCloud Director |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22272 is classified as a critical vulnerability due to its impact on organizational service availability.
To address CVE-2024-22272, administrators should update VMware Cloud Director to the latest version provided by VMware that resolves this vulnerability.
CVE-2024-22272 affects authenticated tenant administrators within VMware Cloud Director environments.
The impact of CVE-2024-22272 is a potential Denial of Service for active sessions within the affected organization.
Currently, there is no documented workaround for CVE-2024-22272, and updating recommended is advised.