VMSA-2022-0025:VMware ESXi and vCenter Server updates address multiple security vulnerabilities

VMware Tanzu Application Service

0 more products

23644

04 October 2022

04 October 2022

CLOSED

HIGH

3.8-7.2

CVE-2022-31680,CVE-2022-31681

VMSA-2022-0025
3.8-7.2
2022-10-06
2022-10-06 (Initial Advisory)
CVE-2022-31680, CVE-2022-31681
VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31680, CVE-2022-31681)
1. Impacted Products
  • VMware ESXi
  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)
2. Introduction

Multiple vulnerabilities in VMware ESXi and vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

 

3a. VMware vCenter Server platform services controller unsafe deserialization vulnerability (CVE-2022-31680)

Description

The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.

Known Attack Vectors

A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server. 

 

Resolution

To remediate CVE-2022-31680 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds

None.

Additional Documentation

None.

Notes

This issue impacts only vCenter Server 6.5 with an external PSC.

Acknowledgements

VMware would like to thank Marcin "Icewall" Noga of Cisco Talos for reporting this vulnerability to us.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
vCenter Server
7.0
Any
CVE-2022-31680
N/A
N/A
Not impacted
N/A
N/A
vCenter Server
6.7
Any
CVE-2022-31680
N/A
N/A
Not impacted
N/A
N/A
vCenter Server
6.5
Any
CVE-2022-31680
important
None
None
3b. VMware ESXi null-pointer dereference vulnerability (CVE-2022-31681)

Description

VMware ESXi contains a null-pointer dereference vulnerability. VMware has evaluated the severity of this issue to be in the Low severity range with a maximum CVSSv3 base score of 3.8.

Known Attack Vectors

A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.

 

 

Resolution

To remediate CVE-2022-31681 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds

None.

Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank VictorV (Tangtianwen) of Cyber Kunlun Lab for reporting this vulnerability to us.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
ESXi
7.0
Any
CVE-2022-31681
low
None
None
ESXi
6.7
Any
CVE-2022-31681
low
None
None
ESXi
6.5
Any
CVE-2022-31681
low
None
None

Impacted Product Suites that Deploy Response Matrix 3b Components:

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
Cloud Foundation (ESXi)
4.x
Any
CVE-2022-31681
low
None
None
Cloud Foundation (ESXi)
3.x
Any
CVE-2022-31681
low
None
None
4. References
5. Change Log


2022-10-06 VMSA-2022-0025
Initial security advisory.

6. Contact

E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

 

This Security Advisory is posted to the following lists:  

[email protected]  

[email protected]  

[email protected] 

 

E-mail: [email protected]

PGP key at:

https://kb.vmware.com/kb/1055 

 

VMware Security Advisories

https://www.vmware.com/security/advisories 

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html 

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html 

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security 

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2022 VMware Inc. All rights reserved.