Lucene search

K
threatpostLisa VaasTHREATPOST:9AD64DC6BE4117F56E76B2BF8F28A597
HistoryJun 24, 2021 - 3:31 p.m.

Critical VMware Carbon Black Bug Allows Auth Bypass

2021-06-2415:31:31
Lisa Vaas
threatpost.com
187

VMware has fixed an uber-severe bug in its Carbon Black App Control (AppC) management server: A server whose job is to lock down critical systems and servers so they don’t get changed willy-nilly.

AppC also ensures that organizations stay in continuous compliance with regulatory mandates.

This is a bad one: VMware puts the flaw, CVE-2021-21998, in the critical severity range with a maximum CVSSv3 base score of 9.4 out of 10. The bug is an authentication bypass that could enable an attacker with network access to the server to get administrative privileges without needing to authenticate.

According to VMware’s advisory, the authentication-bypass bug affects AppC versions 8.0, 8.1, 8.5 before 8.5.8, and 8.6 before 8.6.2.

As pointed out by Heimdal Security, depending on the environment, threat actors could exploit the vulnerability “to maximum advantage to attack anything from point-of-sale [systems] (PoS) to industrial-control systems.”

To avoid that, organizations must patch, as there are no workarounds available.

Below are the patches, listed in the Fixed Version column of the VMware’s Response Matrix:

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Version Workarounds Additional Documentation
AppC 8.6.x Windows CVE-2021-21998 9.4 critical 8.6.2 None None
AppC 8.5.x Windows CVE-2021-21998 9.4 critical

8.5.8

| None | None
AppC | 8.1.x, 8.0.x | Windows | CVE-2021-21998 | 9.4 | critical | Hotfix | None | None

Credit for discovering and reporting CVE-2021-21999 goes to Zeeshan Shaikh from NotSoSecure, who worked with Trend Micro Zero Day Initiative (ZDI) and Hou JingYi of Qihoo 360.

Plus This: High-Risk Bug in Other VMware Products

Besides the authentication-bypass fix, VMware also published a security advisory for a high-risk bug in VMware Tools, VMware Remote Console for Windows (VMRC), and VMware App Volumes products.

At this point, the bug doesn’t have a severity score from the National Institute of Standards and Technology (NIST), but VMware evaluated it at 7.8 (high severity). The flaw, CVE-2021-21999, is a local privilege-escalation vulnerability.

VMware’s advisory lists the affected products as VMware Tools for Windows (11.x.y prior to 11.2.6), VMware Remote Console for Windows (12.x prior to 12.0.1) , and VMware App Volumes (2.x prior to 2.18.10 and 4 prior to 2103).

Once again, there’s no workaround for this one. Admins should patch it as soon as possible, given what VMware said can be done with it:

> An attacker with normal access to a virtual machine may exploit this issue by placing a malicious file renamed as `openssl.cnf’ in an unrestricted directory which would allow code to be executed with elevated privileges.

History of Critical Holes

The security hole in AppC is only the latest critical problem that VMware has addressed. In February, for one, VMware patched three vulnerabilities in its virtual-machine infrastructure for data centers, including a remote code-execution (RCE) flaw in its vCenter Server management platform. The vulnerability could allow attackers to breach the external perimeter of an enterprise data center or leverage backdoors already installed on a system, to find other vulnerable points of network entry to take over affected systems.

More recently, in April, another critical cloud bug, again in VMWare Carbon Black, would have allowed takeover. The bug (CVE-2021-21982) ranked 9.1 out of 10 on the CVSS vulnerability-severity scale. It would enable privilege escalation and the ability to take over the administrative rights for the VMware Carbon Black Cloud Workload appliance.

Join Threatpost for “Tips and Tactics for Better Threat Hunting” — a LIVE event onWed., June 30 at 2:00 PM ET** in partnership with Palo Alto Networks. Learn from Palo Alto’s Unit 42 experts the best way to hunt down threats and how to use automation to help.Register HERE for free.**

References