VMware Patches Critical Vulnerabilities

Wednesday, January 3, 2018 @ 02:01 PM gHale

VMware patched three critical vulnerabilities in vSphere Data Protection (VDP).

The three vulnerabilities include an arbitrary file upload, authentication bypass and path traversal issues.

RELATED STORIES
Unpatched macOS Security Flaw
Apple Patches KRACK Hole
Apple Releases OS Fix
Apple Patches KRACK Holes

vSphere Data Protection is a backup and recovery solution for vSphere environments. The product is no longer offered by VMware since April 2017, but the company will continue to provide general support for version 6.x until 2020 and technical guidance until 2022.

VMware published an advisory saying there were vulnerabilities in versions 5.x, 6.0.x and 6.1.x. VMware has not credited anyone for discovering the weaknesses.

One of the flaws, tracked as CVE-2017-15548, allows an unauthenticated attacker to remotely bypass authentication and gain root access to a vulnerable system.

Another issue, identified as CVE-2017-15549, allows a remote attacker with access to a low-privileged account to upload malicious files to any location on the server file system.

The last vulnerability is a path traversal issue tracked as CVE-2017-15550, which allows an authenticated attacker with low privileges to access arbitrary files on the server in the context of the vulnerable application.

The security holes ended up fixed after the company released VDP 6.1.6 and 6.0.7. Users of version 5.x have been advised to update to version 6.0.7 or newer.



Leave a Reply

You must be logged in to post a comment.