Remote Code Execution Vulnerability Patched in VMware Cloud Director

May 21, 2020

VMware informed customers on Tuesday that it has patched a high-severity remote code execution vulnerability in its Cloud Director product.

The vulnerability, tracked as CVE-2020-3956, has been described as a code injection issue that allows an authenticated attacker to send malicious traffic to Cloud Director, which could result in arbitrary code execution.

“This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access,” VMware said in its advisory.

The security flaw impacts VMware Cloud Director 10.0.x, 9.7.x and 9.5.x on Linux and Photon OS appliances, and version 9.1.x on Linux. Versions 8.x, 9.0.x and 10.1.0 are not affected.

VMware has released updates that should patch the vulnerability, as well as a workaround that users can apply to prevent attacks.

Tomáš Melicher and Lukáš Václavík of Citadelo have been credited for reporting the issue to VMware.

Earlier this month, VMware released patches for vRealize Operations Application Remote Collector (ARC) to address a couple of recently disclosed Salt vulnerabilities that have already been exploited to hack organizations.

In April, the virtualization giant patched a critical vulnerability that can be exploited by hackers to compromise vCenter Server or other services. Researchers disclosed details about the flaw a few days later.

Related: VMware Again Fails to Patch Privilege Escalation Vulnerability in Fusion

Related: VMware Patches Serious Flaws in vRealize Operations for Horizon Adapter

Related: VMware Patches ESXi Vulnerability That Earned Hacker $200,000

view counter

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Previous Columns by Eduard Kovacs:


Read the original article and additional information at Cyware Social