Security News > 2020 > May > VMware to Patch Recent Salt Vulnerabilities in vROps

VMware to Patch Recent Salt Vulnerabilities in vROps
2020-05-11 14:25

VMware is working on patches for its vRealize Operations Manager product to fix two recently disclosed Salt vulnerabilities that have already been exploited to hack organizations.

Researchers discovered recently that the configuration management and orchestration system Salt is affected by serious vulnerabilities that can be exploited for authentication bypass and directory traversal.

A few days later, organizations started disclosing data breaches that involved exploitation of the vulnerabilities, including LineageOS, Ghost, DigiCert and.

VMware says the Application Remote Collector functionality introduced in vROps 7.5 uses Salt.

"CVE-2020-11651 may allow a malicious actor with network access to port 4505 or 4506 on the ARC to take control of the ARC and any Virtual Machines the ARC may have deployed a Telegraf agent to. CVE-2020-11652 may allow a malicious actor with network access to port 4505 or 4506 on the ARC to access the entirety of the ARC filesystem," the company said in its advisory.


News URL

http://feedproxy.google.com/~r/Securityweek/~3/BBs6HG8mVvI/vmware-patch-recent-salt-vulnerabilities-vrops

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2020-04-30 CVE-2020-11651 An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2.
network
low complexity
saltstack opensuse debian canonical vmware
critical
9.8
2020-04-30 CVE-2020-11652 Path Traversal vulnerability in multiple products
An issue was discovered in SaltStack Salt before 2019.2.4 and 3000 before 3000.2.
6.5

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Vmware 146 11 222 256 102 591