logo
DATABASE RESOURCES PRICING ABOUT US

VMware vRealize Operations updates address Server Side Request Forgery and Arbitrary File Write vulnerabilities (CVE-2021-21975, CVE-2021-21983)

Description

##### **1\. Impacted Products** * VMware vRealize Operations * VMware Cloud Foundation * vRealize Suite Lifecycle Manager ##### **2\. Introduction** Multiple vulnerabilities in VMware vRealize Operations were privately reported to VMware. Patches and Workarounds are available to address these vulnerabilities in impacted VMware products. ##### **3a. Server Side Request Forgery in vRealize Operations Manager API (CVE-2021-21975)** **Description** The vRealize Operations Manager API contains a Server Side Request Forgery. VMware has evaluated this issue to be of 'Important' severity with a maximum CVSSv3 base score of [8.6](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N>). **Known Attack Vectors** A malicious actor with network access to the vRealize Operations Manager API can perform a Server Side Request Forgery attack to steal administrative credentials. **Resolution** To remediate CVE-2021-21975 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to impacted deployments. **Workarounds** Workarounds for CVE-2021-21975 have been listed in the 'Workarounds' column of the 'Response Matrix' below. **Additional Documentation** A FAQ was created which is listed in the 'Additional Documentation' column of the 'Response Matrix' below. **Acknowledgements** VMware would like to thank Egor Dimitrenko of Positive Technologies for reporting this vulnerability to us. ##### **3b. Arbitrary file write vulnerability in vRealize Operations Manager API (CVE-2021-21983)** **Description** The vRealize Operations Manager API contains an arbitrary file write vulnerability. VMware has evaluated this issue to be of 'Important' severity with a maximum CVSSv3 base score of [7.2](<https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H>). **Known Attack Vectors** An authenticated malicious actor with network access to the vRealize Operations Manager API can write files to arbitrary locations on the underlying photon operating system. **Resolution** To remediate CVE-2021-21983 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments. **Workarounds** Workarounds for CVE-2021-21983 have been listed in the 'Workarounds' column of the 'Response Matrix' below. **Additional Documentation** A FAQ was created which is listed in the 'Additional Documentation' column of the 'Response Matrix' below. **Acknowledgements** VMware would like to thank Egor Dimitrenko of Positive Technologies for reporting this vulnerability to us. **Notes** [1] The hotfixes previously mentioned in this advisory were found to only have partially resolved CVE-2021-21975 leaving a residual risk of moderate severity (CVSS = 4.3). Hotfixes created to resolve the vulnerabilities documented in [VMSA-2021-0018](<https://www.vmware.com/security/advisories/VMSA-2021-0018.html>) also include complete fixes for CVE-2021-21975. [2] vRealize Operations Manager 8.4.0 shipped with the aforementioned incomplete fixes, and is therefore partially impacted by CVE-2021-21975.


Affected Software


CPE Name Name Version
vrealize operations manager KB83210
vrealize operations manager KB83095
vrealize operations manager KB83094
vrealize operations manager KB83093
vrealize operations manager KB82367
vrealize operations manager No patch planned
vrealize operations manager No patch planned
vmware cloud foundation (vrops) KB83260
vmware cloud foundation (vrops) KB83260
vrealize suite lifecycle manager (vrops) KB83260

Related