

Other security vendors have quickly endorsed VMware's warnings. VMware thanked SolidLab LLC, the Trend Micro Zero Day Initiative, and Vantage Point Security for identifying and disclosing the bugs. Even the least severe of the flaws – 4.3-rated CVE-2021-21993 – can lead to information leaks.


CVE-2021-22017 relates to improper implementation of URI normalization and means internal endpoints could be accessed. CVE-2021-22011 concerns an unauthenticated API endpoint vulnerability in vCenter Server Content Library. CVE-2021-22015 allows local privilege escalation due to improper permissions of files and directories. The company has also urged users to look beyond CVE-2021-22005, because the 18 other flaws it has disclosed need their own responses. VMware’s response to these flaws is unusual in its volume and vehemence – The Register's virtualization desk cannot recall the company issuing so many documents, using such strong language, to respond to any previous flaw. However, given the severity, we strongly recommend that you act."

"All environments are different, have different tolerance for risk, and have different security controls & defense-in-depth to mitigate risk, so the decision on how to proceed is up to you. "Organizations that practice change management using the ITIL definitions of change types would consider this an 'emergency change,' states VMware's FAQ. Cloud Foundation versions 4.3.1 and 3.10.2.2 also don't need urgent remediation.īut vSphere 6.5, Cloud Foundation 3.x and 4.x, vCenter Server 6.7 and 7.0, all need patches, ASAP. The first is to check your version number, because vCenter Server 7.0 U2d, 6.7U3o, and 6.5 U3q are already fixed.
