Security News > 2021 > June > VMware Patches Critical Vulnerability in Carbon Black App Control

VMware this week announced the availability of patches for an authentication bypass vulnerability in VMware Carbon Black App Control running on Windows machines.
Carbon Black App Control is designed to improve the security of servers and other critical systems by locking them down to prevent unauthorized tampering.
Even if the attacker doesn't need valid credentials for the target application, they would still have to first gain network access to the VMware Carbon Black App Control management server for the attack to succeed, VMware explains in an advisory.
VMware notes that there are no workarounds to mitigate this vulnerability.
Fixed releases include VMware Carbon Black App Control 8.6.2 and 8.5.8, along with a hotfix already available for the 8.1.x and 8.0.x versions of AppC. Users need to log into the Carbon Black UEX Portal to download the necessary files.
VMware says the vulnerability was reported privately.
News URL
Related news
- Critical Apache Roller Vulnerability (CVSS 10.0) Enables Unauthorized Session Persistence (source)
- Critical Erlang/OTP SSH Vulnerability (CVSS 10.0) Allows Unauthenticated Code Execution (source)
- Critical Commvault RCE vulnerability fixed, PoC available (CVE-2025-34028) (source)
- Critical Windows Server 2025 dMSA Vulnerability Enables Active Directory Compromise (source)
- Over 100,000 WordPress Sites at Risk from Critical CVSS 10.0 Vulnerability in Wishlist Plugin (source)