VMware issued an advisory informing users about a critical bug that exists in all versions of its VMware Carbon Black Cloud Workload product before 1.0.1 and could be exploited by attackers to evade authentication and take over the system, The Hacker News reports.
Tracked as CVE-2021-21982 and having a 9.1 rating under the CVSS scoring system, the vulnerability involves a URL on the VMware Carbon Black Cloud Workload appliance’s administrative interface that can be “manipulated to bypass authentication” and grant a threat actor access to the appliance’s administration API, and from there view and modify administrative configuration settings, VMware said in its release.
VMware has released a fix for the vulnerability as well as for two unrelated flaws in its vRealize Operations Manager software, CVE-2021-21975 and CVE-2021-21983, which attackers could use to perform Server Side Request Forgery attacks to steal administrator credentials and insert files into the underlying photon operating system, the company said.
Jill Aitoro is senior vice president of content strategy for CyberRisk Alliance. She has more than 20 years of experience editing and reporting on technology, business and policy. Prior to joining CRA, she worked at Sightline Media as editor of Defense News and executive editor of the Business-to-Government Group. She previously worked at Washington Business Journal and Nextgov, covering federal technology, contracting and policy, as well as CMP Media’s VARBusiness and CRN and Penton Media’s iSeries News.
Google Cloud recently introduced Community Security Analytics (CSA), a set of open-sourced queries and rules for self-service security analytics geared toward helping security teams detect common cloud-based threats.
Agreement gives Presidio the ability to market API solutions, a bot manager, DDOs protection and the Cloud Native Protection through the AWS Marketplace.