Proof-of-concept exploit code is now available for a pre-authentication remote code execution (RCE) vulnerability allowing attackers to execute arbitrary code remotely with root privileges on unpatched Cloud Foundation and NSX Manager appliances.
The flaw (CVE-2021-39144) is in the XStream open-source library used by the two VMware products and was assigned an almost maximum CVSSv3 base score of 9.8/10 by VMware.
Unauthenticated threat actors can exploit it remotely in low-complexity attacks that will not require user interaction.
VMware released security updates to address the CVE-2021-39144 flaw reported by Sina Kheirkhah of MDSec and Steven Seeley of Source Incite on Tuesday.
Additionally, because of the severity of the issue, the company also provided patches for some end-of-life products.
The same day, Kheirkhah also published proof-of-concept (PoC) exploit code and a technical analysis of the vulnerability on Seeley’s blog.
“An attacker can send a specially crafted XStream marshalled payload with a dynamic proxy and trigger remote code execution in the context of root,” the security researcher explained.
PoC exploit in action (Sina Kheirkhah)
On Friday, VMware also updated its advisory to confirm that “exploit code leveraging CVE-2022-39144 against VCF (NSX-V) has been published.”
Workaround also available
VMware has also shared a temporary solution for admins who cannot immediately deploy security updates to patch their appliances.
According to the steps detailed in a separate support document, admins must log into each SDDC manager Virtual Machine in their Cloud Foundation environment via SSH and sudo to the root account.
Next, they have to upgrade the XStream library to version 1.4.19 by applying an NSX for vSphere (NSX-V) hot patch to remove the attack vector.
However, unlike applying the CVE-2021-39144 security updates released Tuesday, the workaround will require admins to go through this procedure each time “a new VI workload domain is created.”
In August, VMware warned customers of another public PoC exploit targeting a critical authentication bypass security flaw (CVE-2022-31656) in multiple VMware products, allowing attackers to gain admin privileges on unpatched appliances.
VMware also informed customers who updated to vCenter Server 8.0 (the latest version) this month that they’ll have to wait for a patch to address a privilege escalation vulnerability the company disclosed almost a year ago, in November 2021.
- EdwinDavidson – 3 days ago
How about we hold companies that continually violate security measures responsible for such aggressions? I mean really, how many times do we allow them to toss out new code without such any checks? This is a 40 year old problem. It is caused by hiring people that don't know what they are doing and letting them produce code. STOP THIS!