vRealize Automation, vSphere Integrated Containers, and AirWatch Console updates address multiple security vulnerabilities

2018-01-26T00:00:00
ID VMSA-2018-0006
Type vmware
Reporter VMware
Modified 2018-01-26T00:00:00

Description

1. Summary

vRealize Automation, vSphere Integrated Containers, and AirWatch Console updates address multiple security vulnerabilities

2. Relevant Products
  • vRealize Automation (vRA)
  • vSphere Integrated Containers (VIC)
  • VMware AirWatch Console (AWC)
3. Problem Description

a. vRealize Automation and vSphere Integrated Containers deserialization vulnerability via Xenon

vRealize Automation and vSphere Integrated Containers contain a deserialization vulnerability via Xenon. Successful exploitation of this issue may allow remote attackers to execute arbitrary code on the appliance.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4947 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product vRA

Product Version 7.3

Running on Linux

Severity Critical

Replace with/ Apply Patch KB52326, KB52316

Mitigation/ Workaround None

VMware Product vRA

Product Version 7.2

Running on Linux

Severity Critical

Replace with/ Apply Patch KB52320

Mitigation/ Workaround None

VMware Product vRA

Product Version 7.1.x

Running on Linux

Severity N/A

Replace with/ Apply Patch not affected

Mitigation/ Workaround None

VMware Product vRA

Product Version 7.0.x

Running on Linux

Severity N/A

Replace with/ Apply Patch not affected

Mitigation/ Workaround None

VMware Product vRA

Product Version 6.x

Running on Linux

Severity N/A

Replace with/ Apply Patch not affected

Mitigation/ Workaround None

VMware Product VIC

Product Version 1.x

Running on Linux

Severity Critical

Replace with/ Apply Patch 1.3.0

Mitigation/ Workaround None


b. VMware AirWatch Console Cross Site Request Forgery (CSRF)

VMware AirWatch Console contains a Cross Site Request Forgery vulnerability when accessing the App Catalog. An attacker may exploit this issue by tricking users into installing a malicious application on their devices.

VMware would like to thank Abhishek Vijay Nayak for reporting this issue to us.

The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the identifier CVE-2017-4951 to this issue.

Column 5 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.

VMware Product AWC

Product Version 9.2.x

Running on Any

Severity Important

Replace with/ Apply Patch 9.2.2

Mitigation/ Workaround None

VMware Product AWC

Product Version 9.1.x

Running on Any

Severity Important

Replace with/ Apply Patch 9.1.5

Mitigation/ Workaround None

4. Solution

Please review the patch/release notes for your product and version and verify the checksum of your downloaded file.

VMware vRealize Automation 7.3

Downloads and Documentation:

<https://my.vmware.com/web/vmware/info/slug/infrastructure_operations_management/vmware_vrealize_automation/7_3>

<https://docs.vmware.com/en/vRealize-Automation/index.html>

VMware vRealize Automation 7.2

Downloads and Documentation:

<https://my.vmware.com/web/vmware/info/slug/infrastructure_operations_management/vmware_vrealize_automation/7_2>

<https://docs.vmware.com/en/vRealize-Automation/index.html>

VMware vSphere Integrated Containers 1.3

Downloads and Documentation:

<https://my.vmware.com/web/vmware/info/slug/datacenter_cloud_infrastructure/vmware_vsphere_integrated_containers/1_3>

<https://www.vmware.com/support/pubs/vsphere-integrated-containers-pubs.html>

VMware AirWatch Console 9.2.2
Downloads and Documentation:
<https://support.air-watch.com/articles/115015625647>

VMware AirWatch Console 9.1.5
Downloads and Documentation:
<https://my.air-watch.com/products/AirWatch-Console/Windows/v9.1.0.0>

5. References

<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4947>
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2017-4951>
<https://kb.vmware.com/s/article/52326>
<https://kb.vmware.com/s/article/52316>
<https://kb.vmware.com/s/article/52320>

6. Change log

2018-01-26 VMSA-2018-0006
Initial security advisory in conjunction with the release of vRA 7.3, and 7.2 patches on 2018-01-26.

7. Contact

E-mail list for product security notifications and announcements:

<http://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce>

This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com

bugtraq@securityfocus.com

fulldisclosure@seclists.org

E-mail: security@vmware.com

PGP key at:

<https://kb.vmware.com/kb/1055>

VMware Security Advisories

<http://www.vmware.com/security/advisories>

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases

<https://www.vmware.com/support/policies/lifecycle.html>

VMware Security & Compliance Blog

<https://blogs.vmware.com/security>

Twitter

<https://twitter.com/VMwareSRC>

Copyright 2018 VMware Inc. All rights reserved.