Severity Rating: HIGH
Software Affected
•VMware Application Remote Collector (ARC) version 7.5.0
•VMware Application Remote Collector (ARC) version 8.0.x
•VMware Application Remote Collector (ARC) version 8.1.0
Overview
Multiple vulnerabilities have been reported in VMware vRealize Operations
Application Remote Collector (ARC) which could allow a remote attacker to
bypass authentication and gain access to file system on the targeted
system.
Description
1. Authentication Bypass Vulnerability in VMware vRealize Operations
Application Remote Collector (ARC) ( CVE-2020-11651 )
This vulnerability exists in VMware vRealize Operations Application Remote
Collector (ARC) when the salt-master process ClearFuncs class does not
properly validate method calls. A remote attacker could exploit this
vulnerability by executing arbitrary code on the affected systems.
Successful exploitation of this vulnerability could allow a remote attacker
with network access to port 4505 or 4506 on the ARC to take control of the
ARC and any Virtual Machines.
2. Directory Traversal Vulnerability in VMware vRealize Operations
Application Remote Collector (ARC) ( CVE-2020-11652 )
This vulnerability exists in VMware vRealize Operations Application Remote
Collector (ARC) when the salt-master process ClearFuncs class allows access
to improperly sanitize paths of some methods. A remote attacker could
exploit this vulnerability by executing arbitrary code on the affected
systems.
Successful exploitation of this vulnerability could allow a remote attacker
with network access to port 4505 or 4506 on the ARC to access the entirety
of the ARC file system.
Solution
Apply appropriate fix as mentioned in VMwares Security Advisory:
Vendor Information
VMware
References
VMware
CVE Name
CVE-2020-11651
CVE-2020-11652
About Cert Advisory
We have created this blog to provide latest security advisory from the india cert for the security vulnerability, threats, attacks and patching required to mitigate any kind of cyber attacks.