Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Security | Vulnerability Scans and Assessment » CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability 

CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability 

Posted on 29/03/202203/11/2023 IT Expert By IT Expert No Comments on CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability 
vCenter Server

VMware vCenter Server is an advanced server management software that provides a centralized platform for controlling vSphere environments for visibility across hybrid clouds. You can quickly deploy vCenter Server as a pre-packaged, optimized, and easy-to-maintain virtual appliance. This article discusses “CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability”. Please see How to schedule and join meetings with Microsoft Teams. Also, see how to find Dfs Referral Path and clear Dfs referral Cache.

Patch vCenter Server information disclosure vulnerability

The following disclosure vulnerability was reported to VMware by Yuval Lazar of Pentera. To remediate this vulnerability, apply the patch in the response matrix below as it applies to you.

The vCenter Server contains an information disclosure vulnerability due to improper permission of files. 

VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.5.

Below are the affected products

  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)

However, An information disclosure vulnerability in VMware vCenter Server was privately reported to VMware. Furthermore, Updates are available to remediate this vulnerability in affected VMware products.

CVE-2022-22948 Known Attack Vectors

Moreover, a malicious actor with non-administrative access to the vCenter Server may exploit this issue to gain access to sensitive information.

Also, see how to fix “Network cable Unplugged: Fix VMware “Warning – Multiple default gateways are intended to provide redundancy to a single network“. Also, see how to fix “The process cannot access the file because another process has locked a portion of the file”.

Patch vCenter Server information disclosure vulnerability Resolution

Nonetheless, To remediate CVE-2022-22948. Apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below the response matrix.

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
vCenter Server7.0AnyCVE-2022-229485.5Moderate 7.0 U3dNoneNone
vCenter Server6.7Virtual ApplianceCVE-2022-229485.5Moderate 6.7 U3pNoneNone
vCenter Server6.7WindowsCVE-2022-22948N/AN/AUnaffectedN/AN/A
vCenter Server6.5Virtual ApplianceCVE-2022-229485.5Moderate 6.5 U3rNoneNone
vCenter Server6.5WindowsCVE-2022-22948N/AN/AUnaffectedN/AN/A

CVE-2022-22948: Impacted Product Suites that Deploy Response Matrix Components

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
Cloud Foundation (vCenter Server)4.xAnyCVE-2022-229485.5Moderate Patch pendingNoneNone
Cloud Foundation (vCenter Server)3.xAnyCVE-2022-229485.5Moderate 3.11NoneNone

However, You may want to learn more about this disclosure. I hope you found this article useful on “CVE-2022-22948: Patch available to address vCenter Server information disclosure vulnerability”.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment Tags:VMware, vulnerability

Post navigation

Previous Post: How to install Gradle on Ubuntu
Next Post: How to Install Kubectl on Windows 11

Related Posts

  • PassTheHash
    What is Pass the Hash Attack and how to mitigate the attack Security | Vulnerability Scans and Assessment
  • Print Spooler
    Mitigate Windows Print Spooler Remote Code Execution Vulnerability Security | Vulnerability Scans and Assessment
  • Featured Image Windows Security
    How to protect your Windows PC from potentially unwanted applications Security | Vulnerability Scans and Assessment
  • DUE Deligence vs Due Care
    Relating Due Diligence and Due Care to Veeam Backup and Replication Backup
  • Featured image 1
    How and where to find your BitLocker recovery key on Windows Security | Vulnerability Scans and Assessment
  • 1 8y62mmvjlr 5uovgoq6zmq
    How to download and install DriveLock on Windows Security | Vulnerability Scans and Assessment

More Related Articles

PassTheHash What is Pass the Hash Attack and how to mitigate the attack Security | Vulnerability Scans and Assessment
Print Spooler Mitigate Windows Print Spooler Remote Code Execution Vulnerability Security | Vulnerability Scans and Assessment
Featured Image Windows Security How to protect your Windows PC from potentially unwanted applications Security | Vulnerability Scans and Assessment
DUE Deligence vs Due Care Relating Due Diligence and Due Care to Veeam Backup and Replication Backup
Featured image 1 How and where to find your BitLocker recovery key on Windows Security | Vulnerability Scans and Assessment
1 8y62mmvjlr 5uovgoq6zmq How to download and install DriveLock on Windows Security | Vulnerability Scans and Assessment

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • Screenshot 2022 03 15 at 10.05.53
    VMware Workstation states: What are the differences between Suspend, Power Off, and Run in Background Linux
  • finalelastic
    How to Install and Configure Elasticsearch on Linux  Linux
  • maxresdefault 1
    How to locate and edit the host file on macOS Mac
  • Slide1
    Configure Desktop Wallpaper and Screen Saver Management via GPO Windows
  • Veeam Zero Trust Data Resilience
    Demystifying Zero Trust with Veeam: Design your Architecture Backup
  • microsoft logo rgb wht
    All about Group Policies: Group Policy GPUpdate Commands Windows Server
  • tux through window 620x354 1
    WSL Error 0x8007019e: WSL Register Distribution failed with error Windows
  • SSU
    What to know about the servicing stack update and latest cumulative update in Windows Network | Monitoring

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,803 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

Loading Comments...

You must be logged in to post a comment.