VMware informed customers on Tuesday that it has patched a high-severity remote code execution vulnerability in its Cloud Director product. The vulner
VMware informed customers on Tuesday that it has patched a high-severity remote code execution vulnerability in its Cloud Director product.
The vulnerability, tracked as CVE-2020-3956, has been described as a code injection issue that allows an authenticated attacker to send malicious traffic to Cloud Director, which could result in arbitrary code execution.
“This vulnerability can be exploited through the HTML5- and Flex-based UIs, the API Explorer interface and API access,” VMware said in its advisory.
The security flaw impacts VMware Cloud Director 10.0.x, 9.7.x and 9.5.x on Linux and Photon OS appliances, and version 9.1.x on Linux. Versions 8.x, 9.0.x and 10.1.0 are not affected.
VMware has released updates that should patch the vulnerability, as well as a workaround that users can apply to prevent attacks.
Tomáš Melicher and Lukáš Václavík of Citadelo have been credited for reporting the issue to VMware.
Earlier this month, VMware released patches for vRealize Operations Application Remote Collector (ARC) to address a couple of recently disclosed Salt vulnerabilities that have already been exploited to hack organizations.
In April, the virtualization giant patched a critical vulnerability that can be exploited by hackers to compromise vCenter Server or other services. Researchers disclosed details about the flaw a few days later.