Unauthorized Access Vulnerability in VMware ESXi Affecting VMX Processes
CVE-2021-22042

7.8HIGH

Key Information:

Vendor
Vmware
Vendor
CVE Published:
16 February 2022

Summary

VMware ESXi has a vulnerability that allows unauthorized access to the settingsd service, driven by specific circumstances within the VMX process. This could potentially enable malicious actors who possess privileges within the VMX context to inadvertently access sensitive service configurations running under high privilege levels.

Affected Version(s)

VMware ESXi and VMware Cloud Foundation VMware ESXi(7.0 U3 before ESXi70U3c-19193900, 7.0 U2 before ESXi70U2e-19290878 and 7.0 U1 before ESXi70U1e-19324898) and VMware Cloud Foundation 4.x before 4.4

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.