Critical Cloud Bug in VMWare Carbon Black Allows Takeover
Reading Time: 1 Minute
A critical security vulnerability in the VMware Carbon Black Cloud Workload appliance would allow privilege escalation and the ability to take over the administrative rights for the solution.
CVE-2021-21982 affects a platform designed to secure private clouds, and the virtual servers and workloads that they contain.
The bug (CVE-2021-21982) ranks 9.1 out of 10 on the CVSS vulnerability-severity scale.
The VMware Carbon Black Cloud Workload platform is designed to provide cybersecurity defense for virtual servers and workloads that are hosted on the VMware’s vSphere platform. vSphere is VMware’s cloud-computing virtualization platform.
The issue in the appliance stems from incorrect URL handling, according to VMware’s advisory issued last week.
“A URL on the administrative interface of the VMware Carbon Black Cloud Workload appliance can be manipulated to bypass authentication,” the company noted. “An adversary who has already gained network access to the administrative interface of the appliance may be able to obtain a valid authentication token.”
That in turn would allow the attacker to access the administration API of the appliance. Once signed in as an admin, the attacker could then view and alter administrative configuration settings. Depending on what tools an organization has deployed within the environment, an adversary could carry out a range of attacks, including code execution, disabling security monitoring, enumerating virtual instances within a private cloud and more.
See Also: Offensive Security Tool: DirDar
Egor Dimitrenko of Positive Technologies was credited with discovering the vulnerability.
The security hole is only the latest critical problem that VMware has addressed. In February for instance, VMware patched three vulnerabilities in its virtual-machine infrastructure for data centers, including a remote code execution (RCE) flaw in its vCenter Server management platform. The vulnerability could allow attackers to breach the external perimeter of an enterprise data center or leverage backdoors already installed on a system, to find other vulnerable points of network entry to take over affected systems.
Source: threatpost.com
(Click Link)