VVMware has released security updates to address multiple vulnerabilities in multiple products. A remote attacker could exploit some of these vulnerabilities to take control of an affected system.

VMSA-2022-0031

1. Impacted Products
  • VMware vRealize Network Insight (vRNI)
2. Introduction

Multiple vulnerabilities in VMware vRealize Network Insight (vRNI)were privately reported to VMware. Patches and updates are available to remediate these vulnerabilities in affected VMware products.

3a. VMware vRealize Network Insight (vRNI) command injection vulnerability (CVE-2022-31702)

Description

vRealize Network Insight (vRNI) contains a command injection vulnerability present in the vRNI REST API. VMware has evaluated the severity of this issue to be in the critical severity range with a maximum CVSSv3 base score of 9.8.

Known Attack Vectors

A malicious actor with network access to the vRNI REST API can execute commands without authentication.

Resolution

To remediate CVE-2022-31702 apply the fixes listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

3b. VMware vRealize Network Insight (vRNI) contains a directory traversal vulnerability (CVE-2022-31703)

Description

vRealize Network Insight (vRNI) directory traversal vulnerability in vRNI REST API. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 7.5.

Known Attack Vectors

A malicious actor with network access to the vRNI REST API can read arbitrary files from the server.

Resolution

To remediate CVE-2022-31703 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Acknowledgements

VMware would like to thank ZDI for reporting this vulnerability to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware vRealize Network Insight (vRNI)6.8.0AnyCVE-2022-31702, CVE-2022-31703NAN/AUnaffectedNANA
VMware vRealize Network Insight (vRNI)6.7AnyCVE-2022-31702, CVE-2022-317039.8, 7.5Critical 6.7 HFNoneNA
VMware vRealize Network Insight (vRNI)6.6AnyCVE-2022-31702, CVE-2022-317039.8, 7.5Critical 6.6 HFNoneNA
VMware vRealize Network Insight (vRNI)6.5.xAnyCVE-2022-31702, CVE-2022-317039.8, 7.5Critical 6.5.x HFNoneNA
VMware vRealize Network Insight (vRNI)6.4AnyCVE-2022-31702, CVE-2022-317039.8, 7.5Critical 6.4 HFNoneNA
VMware vRealize Network Insight (vRNI)6.3AnyCVE-2022-31702, CVE-2022-317039.8, 7.5Critical 6.3 HFNoneNA
VMware vRealize Network Insight (vRNI)6.2AnyCVE-2022-31702, CVE-2022-317039.8, 7.5Critical 6.2 HFNoneNA
4. References

Fixed Version(s) and Release Notes:

VMware vRealize Network Insight (vRNI) 6.8
https://customerconnect.vmware.com/downloads/info/slug/infrastructure_operations_management/vmware_vrealize_network_insight/6_x

https://docs.vmware.com/en/VMware-vRealize-Network-Insight/6.8/rn/vmware-vrealize-network-insight-68-release-notes/index.html

VMware vRealize Network Insight (vRNI) 6.x HF
https://kb.vmware.com/s/article/90381

Mitre CVE Dictionary Links:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2022-31702
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-CVE-2022-31703

FIRST CVSSv3 Calculator:

CVE-2022-31702:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVE-2022-31703:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

5. Change Log

2022-12-13 VMSA-2022-0031

Initial security advisory.

Source:
https://www.cisa.gov/uscert/ncas/current-activity/2022/12/13/vmware-releases-security-updates-multiple-products