SB2022120903 - Multiple vulnerabilities in VMware vCenter Server 



SB2022120903 - Multiple vulnerabilities in VMware vCenter Server

Published: December 9, 2022 Updated: December 13, 2022

Security Bulletin ID SB2022120903
Severity
Medium
Patch available
YES
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Denial of service

Breakdown by Severity

Medium 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Input validation error (CVE-ID: CVE-2022-31698)

The vulnerability allows a remote attacker to perform a denial of service (DoS) attack.

The vulnerability exists due to insufficient validation of user-supplied input in the content library service when handling HTTP headers. A remote attacker can send a specially crafted HTTP request to port 443/tcp and perform a denial of service (DoS) attack.


2) Inclusion of Sensitive Information in Log Files (CVE-ID: CVE-2022-31697)

The vulnerability allows a local user to gain access to sensitive information.

The vulnerability exists due to software stores credentials in plain text into log files. A local user with access to a workstation that invoked a vCenter Server Appliance ISO operation (Install/Upgrade/Migrate/Restore) can access plaintext passwords used during that operation.


Remediation

Install update from vendor's website.