vmware cloud-foundation CVE-2022-22948 vulnerability in VMware Products
Published on March 29, 2022

The vCenter Server contains an information disclosure vulnerability due to improper permission of files. A malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.

Vendor Advisory NVD

Known Exploited Vulnerability

This VMware vCenter Server Incorrect Default File Permissions Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.

The following remediation steps are recommended / required by August 7, 2024: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Vulnerability Analysis

CVE-2022-22948 is exploitable with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 2.8 out of four. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.

Incorrect Default Permissions

During installation, installed file permissions are set to allow anyone to modify those files.


Products Associated with CVE-2022-22948

You can be notified by stack.watch whenever vulnerabilities like CVE-2022-22948 are published in these products:

 
 

What versions are vulnerable to CVE-2022-22948?