Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Virtualization » CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability
  • fix windows activation 0x87E10BC6 error
    Fix Error 0x87E10BC6 on a PC running Windows non-core Edition Windows
  • img 1686
    The trust relationship between this workstation and the primary domain failed Windows Server
  • unnamed
    How to disable Network (Wireless) UI from the Welcome screen Windows
  • What Happens if You Turn Off Your Computer During windows update
    What Happens if You Turn Off Your Computer During an Update Windows
  • GPO Blocked Downloads 3
    How to Block downloads on Microsoft Edge using GPO on Windows Server 2019 and 2022 Windows
  • Continuous Deployment Pipeline Using AWS CodePipeline
    Setup a Continuous Deployment Pipeline with AWS CodePipeline AWS/Azure/OpenShift
  • Encapsulationset to Auto
    Error – Command rejected: An interface whose trunk encapsulation is “Auto” can not be configured to “trunk” mode Network | Monitoring
  • LAPS PAssword Not Showing Up
    LAPS password not showing up in GUI Windows

CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability

Posted on 12/10/202212/10/2023 Christian By Christian No Comments on CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability
vcenter_sign_on

VMware vCenter Server is advanced server management software that provides a centralized platform for controlling your VMware vSphere environments. It allows you to automate and deliver a virtual infrastructure across the hybrid cloud with confidence. With VMware Center, you gain centralized visibility, simplified and efficient management at scale, and extensibility across the hybrid cloud from a single console. Here are some related articles: Boot failure: How to fix EFI network timeout on VMware Workstation,. And how to solve VMware workstation .lck error. This article will show you how to resolve CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability.

The following vulnerability was reported by Yaron Zinar and Sagi Sheinfeld of Crowdstrike to Vmware. The vCenter Server contains a privilege escalation vulnerability in the IWA (Integrated Windows Authentication) authentication mechanism.

VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1. Please see Differences between vSphere and ESXi and vCenter.

Impacted Products

The following solutions below are affected.

  • VMware vCenter Server (vCenter Server)
  • VMware Cloud Foundation (Cloud Foundation)

Please here are some exciting articles: VMware vCenter Server and Cloud Foundation: Workaround for CVE2021-22048, vCenter Server File Upload Vulnerability [CRITICAL], vCenter Converter removed from available downloads on VMware use Veeam, how to enable Exploit Protection on Windows using Windows, and CVE-2022-22948. Patch available to address vCenter Server information disclosure vulnerability.

What Exploit Does this Vulnerability Present?

A malicious actor with non-administrative access to the vCenter Server may exploit this issue to elevate privileges to a higher privileged group.

Workarounds to resolve CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability

There are currently no updates (patches) to mitigate this vulnerability. But here is the workaround for CVE-2021-22048: switch to AD over LDAPS authentication.

OR Identity Provider Federation for AD FS (vSphere 7.0 or later) from Integrated Windows Authentication (IWA) as documented in the KB listed in the ‘Workarounds’ column of the ‘Response Matrix’ below.

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
vCenter Server8.0AnyCVE-2021-220487.1Important Patch PendingKB86292None
vCenter Server7.0AnyCVE-2021-220487.1Important Patch Pending [1]KB86292KB89027 [1]
vCenter Server6.7AnyCVE-2021-220487.1Important Patch PendingKB86292None
vCenter Server6.5AnyCVE-2021-220487.1Important Patch PendingKB86292None

Impacted Product Suites that Deploy Response Matrix Components:

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
Cloud Foundation (vCenter Server)4.xAnyCVE-2021-220487.1Important Patch pendingKB86292None
Cloud Foundation (vCenter Server)3.xAnyCVE-2021-220487.1Important Patch PendingKB86292None

Note: VMware has determined that vCenter 7.0u3f updates previously mentioned in the response matrix do not remediate CVE-2021-22048. It may introduce a functional issue for customers using IWA. Please review KB89027 for more information.

I hope you found this short piece on “CVE-2021-22048: VMware vCenter Server updates address a privilege escalation vulnerability” useful. If you have any questions, please let me know in the comment session.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Click to share on X (Opens in new window) X
  • Click to share on Reddit (Opens in new window) Reddit
  • Click to share on LinkedIn (Opens in new window) LinkedIn
  • Click to share on Facebook (Opens in new window) Facebook
  • Click to share on Pinterest (Opens in new window) Pinterest
  • Click to share on Tumblr (Opens in new window) Tumblr
  • Click to share on Telegram (Opens in new window) Telegram
  • Click to share on WhatsApp (Opens in new window) WhatsApp
  • Click to share on Pocket (Opens in new window) Pocket
  • Click to share on Mastodon (Opens in new window) Mastodon
  • Click to share on Bluesky (Opens in new window) Bluesky
  • Click to share on Threads (Opens in new window) Threads
  • Click to share on Nextdoor (Opens in new window) Nextdoor
Security | Vulnerability Scans and Assessment, Virtualization Tags:VMware, vulnerability

Post navigation

Previous Post: VMSA-2022-0026: An arbitrary file read vulnerability in VMware Aria Operations
Next Post: How to install Oracle VirtualBox on a Mac device

Related Posts

  • proxmox
    Clone a Proxmox Container: CT Restoration Guide Virtualization
  • VMware Error Fix
    How to fix “The process cannot access the file because another process has locked a portion of the file” Virtualization
  • Capture
    An account with the same name exists in Active Directory: Re-using the account was blocked by a security policy Security | Vulnerability Scans and Assessment
  • fde container
    Full Disk Encryption with PBA or without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption and Container Encryption Security | Vulnerability Scans and Assessment
  • microsoft
    Fix EFI network timeout on VMware Workstation Virtualization
  • PXE Boot Stuck or No Boot Image was found   Te bootloader did not find any operating system
    Fix PXE Boot Stuck or No Boot Image was found for HyperV VM Virtualization

More Related Articles

proxmox Clone a Proxmox Container: CT Restoration Guide Virtualization
VMware Error Fix How to fix “The process cannot access the file because another process has locked a portion of the file” Virtualization
Capture An account with the same name exists in Active Directory: Re-using the account was blocked by a security policy Security | Vulnerability Scans and Assessment
fde container Full Disk Encryption with PBA or without PBA, UEFI, Secure Boot, BIOS, File and Directory Encryption and Container Encryption Security | Vulnerability Scans and Assessment
microsoft Fix EFI network timeout on VMware Workstation Virtualization
PXE Boot Stuck or No Boot Image was found   Te bootloader did not find any operating system Fix PXE Boot Stuck or No Boot Image was found for HyperV VM Virtualization

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

sysadmin top30a
 
  • fix windows activation 0x87E10BC6 error
    Fix Error 0x87E10BC6 on a PC running Windows non-core Edition Windows
  • img 1686
    The trust relationship between this workstation and the primary domain failed Windows Server
  • unnamed
    How to disable Network (Wireless) UI from the Welcome screen Windows
  • What Happens if You Turn Off Your Computer During windows update
    What Happens if You Turn Off Your Computer During an Update Windows
  • GPO Blocked Downloads 3
    How to Block downloads on Microsoft Edge using GPO on Windows Server 2019 and 2022 Windows
  • Continuous Deployment Pipeline Using AWS CodePipeline
    Setup a Continuous Deployment Pipeline with AWS CodePipeline AWS/Azure/OpenShift
  • Encapsulationset to Auto
    Error – Command rejected: An interface whose trunk encapsulation is “Auto” can not be configured to “trunk” mode Network | Monitoring
  • LAPS PAssword Not Showing Up
    LAPS password not showing up in GUI Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,840 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.