Security News > 2021 > February > Vulnerability in VMware vSphere Replication Can Facilitate Attacks on Enterprises
VMware last week informed customers about the availability of patches for a potentially serious vulnerability affecting its vSphere Replication product.
vSphere Replication, a VMware vSphere component, is a virtual machine replication engine designed for data protection and disaster recovery.
VMware has told customers that several versions of the product are affected by a high-severity command injection vulnerability that can be exploited by a hacker with admin privileges to execute shell commands on the underlying system.
Patches have been released for each of the affected versions of vSphere Replication.
"When carrying out an attack on a company infrastructure, an attacker can detect the VMware vSphere Replication instance at the perimeter of its network and, as the used password is weak, for example, he can guess credentials to enter the administrator interface," Dimitrenko explained.
"After gaining authorized access, the attacker will be able to exploit this vulnerability and execute arbitrary commands on the server with maximum privileges."
News URL
Related news
- Windows vulnerability abused braille “spaces” in zero-day attacks (source)
- SolarWinds Issues Patch for Critical ARM Vulnerability Enabling RCE Attacks (source)
- CISA Adds ScienceLogic SL1 Vulnerability to Exploited Catalog After Active Zero-Day Attack (source)
- VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability (source)
- FortiManager critical vulnerability under active attack (source)
- Cisco Issues Urgent Fix for ASA and FTD Software Vulnerability Under Active Attack (source)