VMware 多个产品存在 Log4j2远程代码执行漏洞(CVE-2021-44228)通告
2021-12-14 11:05:39 Author: blog.nsfocus.net(查看原文) 阅读量:45 收藏

阅读: 45

一、漏洞概述

近日,绿盟科技CERT监测到VMware 发布安全通告,VMware的众多产品受Apache Log4j2远程代码执行漏洞(CVE-2021-44228)的影响。由于Apache Log4j2某些功能存在递归解析功能,未经身份验证的攻击者通过发送特别构造的数据请求包,可在受影响的 VMware 产品中执行任意代码。漏洞PoC已公开,且发现在野利用,建议相关用户尽快采取措施进行排查与防护。

参考链接:https://www.vmware.com/security/advisories/VMSA-2021-0028.html

二、影响范围

受影响产品(更新中):

VMware Horizon

VMware vCenter Server

VMware HCX

VMware NSX-T Data Center

VMware Unified Access Gateway

VMware WorkspaceOne Access

VMware Identity Manager

VMware vRealize Operations

VMware vRealize Operations Cloud Proxy

VMware vRealize Log Insight

VMware vRealize Automation

VMware vRealize Lifecycle Manager

VMware Telco Cloud Automation

VMware Site Recovery Manager, vSphere Replication

VMware Carbon Black Cloud Workload Appliance

VMware Carbon Black EDR Server

VMware Tanzu GemFire

VMware Tanzu Greenplum

VMware Tanzu Operations Manager

VMware Tanzu Application Service for VMs

VMware Tanzu Kubernetes Grid Integrated Edition

VMware Tanzu Observability by Wavefront Nozzle

Healthwatch for Tanzu Application Service

Spring Cloud Services for VMware Tanzu

Spring Cloud Gateway for VMware Tanzu

Spring Cloud Gateway for Kubernetes

API Portal for VMware Tanzu

Single Sign-On for VMware Tanzu Application Service

App Metrics

VMware vCenter Cloud Gateway

VMware Tanzu SQL with MySQL for VMs

VMware vRealize Orchestrator

VMware Cloud Foundation

VMware Workspace ONE Access Connector

VMware Horizon DaaS

VMware Horizon Cloud Connector

VMware NSX Data Center for vSphere

VMware AppDefense Appliance

不受影响产品(更新中):

VMware vSphere ESXi

VMware vCloud Director

VMware vCloud Availability

VMware NSX Advanced Load Balancer (Avi)

VMware Software-Defined WAN (SD-WAN)  

VMware Workspace ONE Assist

VMware RemoteHelp

VMware vCloud Usage Meter

VMware Tanzu Scheduler

VMware Tanzu Kubernetes Grid

SaltStack

参考链接:https://kb.vmware.com/s/article/87068

三、漏洞防护

3.1 官方升级

目前官方已针对以下产品发布了新版本修复该漏洞,请受影响的用户尽快升级版本进行防护,对应产品版本的下载链接及文档如下:

3.2 临时防护措施

1.若业务环境允许,可使用白名单限制web端口访问方式来降低风险

2.客户可根据自身产品结合下列参考链接采取临时防护。

产品版本参考链接
VMware Horizon 8.x, 7.xhttps://kb.vmware.com/s/article/87073
VMware vCenter Server 7.x, 6.xhttps://kb.vmware.com/s/article/87081?lang=en_US
VMware HCX 4.x, 3.xhttps://kb.vmware.com/s/article/86169
VMware NSX-T Data Center 3.x, 2.xhttps://kb.vmware.com/s/article/87086
VMware Unified Access Gateway 21.x, 20.x, 3.xhttps://kb.vmware.com/s/article/87092
VMware Workspace ONE Access 21.x, 20.10.xhttps://kb.vmware.com/s/article/87090
VMware Identity Manager 3.3.xhttps://kb.vmware.com/s/article/87093
VMware vRealize Operations 8.xhttps://kb.vmware.com/s/article/87076
VMware vRealize Operations Cloud Proxy Anyhttps://kb.vmware.com/s/article/87080
VMware vRealize Log Insight 8.xhttps://kb.vmware.com/s/article/87089?lang=en_US
VMware Carbon Black Cloud Workload Appliance 1.xhttps://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Mitigation-Steps-for-VMware-Carbon-Black-Cloud/ta-p/109167
VMware Carbon Black EDR Server 7.x, 6.xhttps://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Mitigation-Steps-for-VMware-Carbon-Black-EDR/ta-p/109168
VMware Tanzu GemFire 9.x, 8.xhttps://community.pivotal.io/s/article/Workaround-to-address-CVE-2021-44228-Apache-Log4j-Remote-Code-Execution-for-all-GemFire-versions?language=en_US
VMware Tanzu Greenplum 6.xhttps://community.pivotal.io/s/article/Workaround-to-address-CVE-2021-44228-Apache-Log4j-Remote-Code-Execution-for-All-Greenplum-Versions?language=en_US
VMware Tanzu Operations Manager 2.xhttps://community.pivotal.io/s/article/5004y00001mPn2N1639255611105?language=en_US
VMware Tanzu Application Service for VMs 2.xhttps://community.pivotal.io/s/article/Workaround-instructions-to-address-CVE-2021-44228-in-Tanzu-Application-Service-2-7-through-2-12?language=en_US
VMware Tanzu Kubernetes Grid Integrated Edition 1.xhttps://community.pivotal.io/s/article/Workaround-instructions-to-address-CVE-2021-44228-in-Tanzu-Kubernetes-Grid-Integrated?language=en_US
VMware Cloud Foundation4.x, 3.xhttps://kb.vmware.com/s/article/87095
VMware Workspace ONE Access Connector (VMware Identity Manager Connector) 21.x, 20.10.x, 19.03.0.1https://kb.vmware.com/s/article/87091
VMware Horizon DaaS 9.1.x, 9.0.xhttps://kb.vmware.com/s/article/87101
VMware NSX Data Center for vSpherehttps://kb.vmware.com/s/article/87099
VMware AppDefense Appliancehttps://community.carbonblack.com/t5/Threat-Research-Docs/Log4Shell-Mitigation-Steps-for-AppDefense/ta-p/109180

声明

本安全公告仅用来描述可能存在的安全问题,绿盟科技不为此安全公告提供任何保证或承诺。由于传播、利用此安全公告所提供的信息而造成的任何直接或者间接的后果及损失,均由使用者本人负责,绿盟科技以及安全公告作者不为此承担任何责任。

绿盟科技拥有对此安全公告的修改和解释权。如欲转载或传播此安全公告,必须保证此安全公告的完整性,包括版权声明等全部内容。未经绿盟科技允许,不得任意修改或者增减此安全公告内容,不得以任何方式将其用于商业目的。


文章来源: http://blog.nsfocus.net/vmware-log4j2/
如有侵权请联系:admin#unsafe.sh