SB2022021512 - Multiple vulnerabilities in VMWare Cloud Foundation (ESXi)



SB2022021512 - Multiple vulnerabilities in VMWare Cloud Foundation (ESXi)

Published: February 15, 2022

Security Bulletin ID SB2022021512
Severity
Medium
Patch available
YES
Number of vulnerabilities 5
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Medium 60% Low 40%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 5 secuirty vulnerabilities.


1) Use-after-free (CVE-ID: CVE-2021-22040)

The vulnerability allows a remote user to compromise the affected system.

The vulnerability exists due to a use-after-free error in the XHCI USB controller. A remote user with administrative permissions on the guest OS can trigger a use-after-free error and execute arbitrary code as the virtual machine's VMX process running on the host.

Successful exploitation of the vulnerability may allow an attacker to compromise the hypervisor.


2) Race condition (CVE-ID: CVE-2021-22041)

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to a double-fetch vulnerability in the UHCI USB controller. A remote user with administrative permissions on the guest OS can trigger a race condition and execute arbitrary code as the virtual machine's VMX process running on the host.
Successful exploitation of the vulnerability may allow an attacker to compromise the hypervisor.


3) Improper access control (CVE-ID: CVE-2021-22042)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to VMX having access to settingsd authorization tickets. A local user with privileges within the VMX process only can access settingsd service running as a high privileged user.


4) Time-of-check Time-of-use (TOCTOU) Race Condition (CVE-ID: CVE-2021-22043)

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to a Time-of-check Time-of-use vulnerability when handling temporary files. A local user with access to settingsd can escalate privileges on the system.


5) Resource management error (CVE-ID: CVE-2021-22050)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to improper management of internal resources within rhttpproxy. A remote attacker can send crafted slow HTTP POST request to the system and perform a denial of service (DoS) attack.


Remediation

Install update from vendor's website.