Vulnerabilitie issues in VMware Cloud Director Availability (VCDA) version 4.7.1.
search cancel

Vulnerabilitie issues in VMware Cloud Director Availability (VCDA) version 4.7.1.

book

Article ID: 369397

calendar_today

Updated On:

Products

VMware Cloud Director

Issue/Introduction

Vulnerabilities in software can pose significant risks to security and functionality. It's essential for organizations using VCDA to stay informed about any vulnerabilities and promptly apply patches or updates provided by VMware to address them.

Vulnerability #1:


OpenSSH < 9.6 Multiple Vulnerabilities

Evidence:
Version source : SSH-2.0-OpenSSH_9.0
Installed version : 9.0
Fixed version : 9.6p1 / 9.6


Reference:
CVE: CVE-2023-48795, CVE: CVE-2023-51384, CVE: CVE-
2023-51385
CVSS Score: 6.4
(CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:N)
LE-Global Ref Id: XS-16948793

Vulnerability #2:


"ICMP Timestamp Request Remote Date Disclosure"

Evidence:
This host returns non-standard timestamps (high bit
is set)
The ICMP timestamps might be in little endian format (not in network format)
The difference between the local and remote clocks is
-2 seconds.


Reference:
CVE: CVE-1999-0524, CWE: 200

Environment

VMware Cloud Director Availability 4.7.1.

Resolution

To mitigate the risk posed by these vulnerabilities, it's advisable to:

  • Regarding the Vulnerability #1: Upgrading to VCDA version 4.7.2, which includes upgraded packages on the appliance, is a proactive approach to addressing security vulnerabilities. By incorporating the necessary security fixes into the upgraded versions, VMware can help ensure that providers have access to a more secure and resilient VCDA deployment.
  • Regarding the Vulnerability #2: The impact of the vulnerabilities is assessed to be very low and it's determined that they won't be addressed by VCDA directly, providers indeed have the option to mitigate the risk by implementing firewall rules to block the specific type of packets associated with the vulnerabilities. Blocking these packets at the firewall level can help reduce the risk of exploitation and provide an additional layer of security for the VCDA deployment.