Coming Soon...

Q-CERT website is currently under maintenance. We should be back shortly. Thank you for yor patience.

RCE (Spring4Shell) Vulnerability in VMware Products

Issued: 
Thursday, 7 April, 2022
Last Revision: 
Thursday, 7 April, 2022
Vendor: 
Severity Level: 
Summary: 

Security updates have been released for the Spring4Shell remote code execution vulnerability, which affects several VMware cloud computing and virtualization products. This problem is caused by a critical vulnerability in the Spring Core Java framework, tracked as CVE-2022-22965.

 

Vulnerability is publicly disclosed, actively exploited, and can be used to attack affected products without authentication. 

 

This vulnerability may be exploited by a malicious actor, who has access to the network for an impacted VMware product, to take full control of the target system.

 

CVE/Vulnerability

     Description 

CVSS3.0 Score

CVE-2022-22965

Remote Code Execution Vulnerability

9.8

 

 

Table 1: Vulnerability details 

 

 

 

CVE/Vulnerability

  Affected Product(s)

Affected

Versions

Fixed Versions

CVE-2022-22965

VMware Tanzu Application Service for

VMs

 

2.11

2.11.17

2.12

2.12.10

2.13

2.13.1

2.10

2.10.29

CVE-2022-22965

VMware Tanzu Operations Manager

 

2.8

2.8.20

2.9

2.9.35

2.10

2.10.35

CVE-2022-22965

VMware Tanzu Kubernetes Grid Integrated Edition (TKGI)

1.11

Patch pending

1.12

Patch pending

1.13

Patch pending

 

 

                                                                                                 Table 2: Vulnerable versions 

Recommendation: 

Updates have already been made available for the first two products in the “Affected Products” table, covering multiple versions with point releases, but VMware Tanzu Kubernetes Grid Integrated (TKGI) Edition has yet to receive a permanent fix.

 

In order to temporarily secure VMware Tanzu Kubernetes Grid Integrated (TKGI) Edition, VMware has released workaround instructions, please refer link in refrences.