{"id":2584,"date":"2021-02-25T10:15:54","date_gmt":"2021-02-25T15:15:54","guid":{"rendered":"https:\/\/cert.pa\/?p=2584"},"modified":"2021-02-25T10:15:54","modified_gmt":"2021-02-25T15:15:54","slug":"csirt-panama-aviso-2021-02-25-vmware-multiples-vulnerabilidades-en-productos-vmware","status":"publish","type":"post","link":"https:\/\/cert.pa\/?p=2584","title":{"rendered":"CSIRT Panam\u00e1 Aviso 2021-02-25 VMware: M\u00faltiples vulnerabilidades en productos VMware"},"content":{"rendered":"\n<p>CSIRT Panam\u00e1 Aviso 2021-02-25 VMware: M\u00faltiples\nvulnerabilidades en productos VMware<\/p>\n\n\n\n<p>Gravedad: Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;<\/p>\n\n\n\n<p>Fecha de publicaci\u00f3n: Febrero 25,\n2021<br>\n\u00daltima revisi\u00f3n: Febrero 25, 2021<\/p>\n\n\n\n<p>Sitio web: https:\/\/www.vmware.com\/latam.html<br>\nSistemas Afectados: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vCenter Server, versiones 6.5, 6.7 y 7.0;<\/li><li>Cloud Foundation (vCenter Server), versiones 3.x y\n4.x;<\/li><li>ESXi, versiones 6.5, 6.7 y 7.0;<\/li><li>Cloud Foundation (ESXi), versiones 3.x y 4.x.<\/li><li><strong>Descripci\u00f3n<\/strong><\/li><\/ul>\n\n\n\n<p>Mikhail Klyuchnikov, investigador de Positive\nTechnologies, y Lucas Leong, investigador de Trend Micro, han reportado 3\nvulnerabilidades, de severidades cr\u00edtica, alta y media, de tipos ejecuci\u00f3n\nremota de c\u00f3digo, desbordamiento de mont\u00edculo (heap) y SSRF (Server Side\nRequest Forgery), respectivamente.<\/p>\n\n\n\n<ol class=\"wp-block-list\"><li><strong>Impacto<\/strong><\/li><\/ol>\n\n\n\n<p>Vulnerabilidad: CVE-2021-21972<\/p>\n\n\n\n<p>Vulnerabilidad de alto riesgo, permite a un\natacante remoto ejecutar c\u00f3digo arbitrario en el sistema objetivo. La\nvulnerabilidad existe debido a una validaci\u00f3n insuficiente de los datos\ningresados por el usuario en vSphere Client. Un atacante remoto no autenticado\npuede enviar una solicitud HTTP al puerto 443\/tcp y ejecutar c\u00f3digo arbitrario\nen el sistema.<\/p>\n\n\n\n<p>Vulnerabilidad: CVE-2021-21973<\/p>\n\n\n\n<p>Permite a un atacante remoto realizar ataques de\nfalsificaci\u00f3n de solicitudes del lado del servidor (en ingl\u00e9s \u201cserver side\nrequest forgery\u201d, SSRF). La vulnerabilidad existe debido a una validaci\u00f3n\ninsuficiente de los datos ingresados por el usuario en vSphere Client. Un\natacante remoto no autenticado puede enviar una solicitud HTTP especialmente\ndise\u00f1ada y enga\u00f1ar a la aplicaci\u00f3n para iniciar solicitudes a sistemas\narbitrarios.<\/p>\n\n\n\n<p>De ser exitosa, la explotaci\u00f3n de esta\nvulnerabilidad permitir\u00eda a un atacante remoto acceder a datos sensibles,\nubicados en la red local, o enviar solicitudes maliciosas a otros servidores\ndesde el sistema vulnerable.<\/p>\n\n\n\n<p><strong>III. Referencia a soluciones, herramientas e\ninformaci\u00f3n<\/strong><strong><\/strong><\/p>\n\n\n\n<p>Actualizaci\u00f3n de los productos VMware en las\nsiguientes versiones: <\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>vCenter\nServer, versiones 6.5, 6.7 y 7.0;<\/li><li>Cloud\nFoundation (vCenter Server), versiones 3.x y 4.x;<\/li><li>ESXi,\nversiones 6.5, 6.7 y 7.0;<\/li><li>Cloud\nFoundation (ESXi), versiones 3.x y 4.x.<\/li><\/ul>\n\n\n\n<p><strong>Fuentes:<\/strong><\/p>\n\n\n\n<ul class=\"wp-block-list\"><li>CSIRT\nChile. 25 de febrero del 2021. Vulnerabilidades. Recopilado en: <a href=\"https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa21-00395-01-csirt-alerta-vulnerabilidades-en-vmware\/\">https:\/\/www.csirt.gob.cl\/vulnerabilidades\/9vsa21-00395-01-csirt-alerta-vulnerabilidades-en-vmware\/<\/a><\/li><li>INCIBE-CERT. M\u00faltiples\nvulnerabilidades en productos VMware. Recopilado en: https:\/\/www.incibe-cert.es\/alerta-temprana\/avisos-seguridad\/multiples-vulnerabilidades-productos-vmware-19<\/li><\/ul>\n\n\n\n<p><strong>Informaci\u00f3n de contacto<\/strong><br>\nCSIRT PANAMA<br>\nComputer Security Incident Response Team Autoridad Nacional para la Innovacion\nGubernamental<br>\nE-Mail: info@cert.pa<br>\nPhone: +507 520-CERT (2378)<br>\nWeb: https:\/\/cert.pa<br>\nTwitter: @CSIRTPanama<br>\nKey ID: 16F2B124<\/p>\n","protected":false},"excerpt":{"rendered":"<p>CSIRT Panam\u00e1 Aviso 2021-02-25 VMware: M\u00faltiples vulnerabilidades en productos VMware Gravedad: Alta&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp;&nbsp; Fecha de publicaci\u00f3n: Febrero 25, 2021 \u00daltima revisi\u00f3n: Febrero 25, 2021 Sitio web: https:\/\/www.vmware.com\/latam.html Sistemas Afectados: vCenter Server, versiones 6.5, 6.7 y 7.0;Cloud&#8230;<\/p>\n","protected":false},"author":4,"featured_media":967,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[4],"tags":[72,96,68],"class_list":["post-2584","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-avisos-de-seguridad","tag-avisos-de-seguridad","tag-vmware","tag-vulnerabilidades"],"aioseo_notices":[],"_links":{"self":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2584","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=2584"}],"version-history":[{"count":1,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2584\/revisions"}],"predecessor-version":[{"id":2585,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/posts\/2584\/revisions\/2585"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=\/wp\/v2\/media\/967"}],"wp:attachment":[{"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=2584"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=2584"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cert.pa\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=2584"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}