Headline
CVE-2022-31681: VMSA-2022-0025
VMware ESXi contains a null-pointer deference vulnerability. A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.
Advisory ID: VMSA-2022-0025
CVSSv3 Range: 3.8-7.2
Issue Date: 2022-10-06
Updated On: 2022-10-06 (Initial Advisory)
CVE(s): CVE-2022-31680, CVE-2022-31681
Synopsis: VMware ESXi and vCenter Server updates address multiple security vulnerabilities (CVE-2022-31680, CVE-2022-31681)
Share this page on social media
Sign up for Security Advisories
****1. Impacted Products****
VMware ESXi
VMware vCenter Server (vCenter Server)
VMware Cloud Foundation (Cloud Foundation)
****2. Introduction****
Multiple vulnerabilities in VMware ESXi and vCenter Server were privately reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.
****3a. VMware vCenter Server platform services controller unsafe deserialization vulnerability (CVE-2022-31680)****
The vCenter Server contains an unsafe deserialisation vulnerability in the PSC (Platform services controller). VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.2.
A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.
To remediate CVE-2022-31680 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.
This issue impacts only vCenter Server 6.5 with an external PSC.
VMware would like to thank Marcin “Icewall” Noga of Cisco Talos for reporting this vulnerability to us.
Product
Version
Running On
CVE Identifier
CVSSv3
Severity
Fixed Version
Workarounds
Additional Documentation
vCenter Server
7.0
Any
CVE-2022-31680
N/A
N/A
Not impacted
N/A
N/A
vCenter Server
6.7
Any
CVE-2022-31680
N/A
N/A
Not impacted
N/A
N/A
vCenter Server
6.5
Any
CVE-2022-31680
7.2
important
6.5 U3u
None
None
****3b. VMware ESXi null-pointer dereference vulnerability (CVE-2022-31681)****
VMware ESXi contains a null-pointer deference vulnerability. VMware has evaluated the severity of this issue to be in the Low severity range with a maximum CVSSv3 base score of 3.8.
A malicious actor with privileges within the VMX process only, may create a denial of service condition on the host.
To remediate CVE-2022-31681 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.
VMware would like to thank VictorV (Tangtianwen) of Cyber Kunlun Lab for reporting this vulnerability to us.
Impacted Product Suites that Deploy Response Matrix 3b Components:
Product
Version
Running On
CVE Identifier
CVSSv3
Severity
Fixed Version
Workarounds
Additional Documentation
Cloud Foundation (ESXi)
4.x
Any
CVE-2022-31681
3.8
low
KB88695
None
None
Cloud Foundation (ESXi)
3.x
Any
CVE-2022-31681
3.8
low
KB89692
None
None
****4. References****
****5. Change Log****
**2022-10-06 VMSA-2022-0025
**Initial security advisory.
****6. Contact****
Related news
Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Cisco Talos recently discovered an exploitable data deserialization vulnerability in the VMware vCenter server platform. VMware is one of the most popular virtual machine solutions currently available, and its vCenter software allows users to manage an entire environment of
Marcin “Icewall” Noga of Cisco Talos discovered this vulnerability. Blog by Jon Munshaw. Cisco Talos recently discovered an exploitable data deserialization vulnerability in the VMware vCenter server platform. VMware is one of the most popular virtual machine solutions currently available, and its vCenter software allows users to manage an entire environment of VMs. The vulnerability Talos discovered is a post-authentication Java deserialization issue that could corrupt the software in a way that could allow an attacker to exploit arbitrary code on the target machine. TALOS-2022-1587 (CVE-2022-31680) is triggered if an adversary sends a specially crafted HTTP request to a targeted machine. The attacker would first have to log in with legitimate credentials to vCenter to be successful. Cisco Talos worked with VMware to ensure that this issue is resolved and an update is available for affected customers, all in adherence to Cisco’s vulnerability disclosure policy. Users are enc...