vulnerability
VMWare vRealize: (CVE-2021-22024)
| Severity | CVSS | Published | Added | Modified |
|---|---|---|---|---|
| 5 | (AV:N/AC:L/Au:N/C:P/I:N/A:N) | Aug 24, 2021 | Nov 4, 2021 | Jan 12, 2023 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
Aug 24, 2021
Added
Nov 4, 2021
Modified
Jan 12, 2023
Description
The vRealize Operations Manager API (8.x prior to 8.5) contains an arbitrary log-file read vulnerability. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can read any log file resulting in sensitive information disclosure.
Solutions
vmware-vrealize-upgrade-7_5_0_18528913vmware-vrealize-upgrade-8_0_1_18442173vmware-vrealize-upgrade-8_1_1_18442224vmware-vrealize-upgrade-8_2_0_18439239vmware-vrealize-upgrade-8_3_0_18439213vmware-vrealize-upgrade-8_4_0_18456797vmware-vrealize-upgrade-8_5_0
NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.