www.vmware.com
Open in
urlscan Pro
2a02:26f0:3500:89b::2ef
Public Scan
URL:
https://www.vmware.com/security/advisories/VMSA-2024-0008.html
Submission: On April 13 via api from IN — Scanned from DE
Submission: On April 13 via api from IN — Scanned from DE
Form analysis
3 forms found in the DOM//www.vmware.com/search-redesign.html
<form action="//www.vmware.com/search-redesign.html" id="globalsearch" class="wrapperSearch">
<input type="text" name="q" id="ub-search" class="d-none" placeholder="Search" title="Search" aria-role="searchbox" role="searchbox">
<a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">
<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
</a>
<div class="search-auto-fill d-none">
<span>SUGGESTED SEARCHES</span>
<div class="search-auto-fill-option"></div>
</div>
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
//www.vmware.com/search-redesign.html
<form action="//www.vmware.com/search-redesign.html" id="globalsearch" class="wrapperSearch">
<a href="javascript:void(0);" tabindex="-1" class="search-icon ml-lg-3" name="nav_utility : Search">
</a>
<input type="text" name="q" id="ub-search" placeholder="Search" title="Search" role="searchbox">
<a href="javascript:void(0);" aria-label="Close Search" class="close-icon closeIconSearchComp ml-lg-3" name="nav_utility : Close" link-name="Close">
</a>
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
Name: securitysignup —
<form accept-charset="UNKNOWN" id="securitysignup" name="securitysignup" data-gtm-form-interact-id="0">
<label class="email-input-label" for="securityEmail">*Email</label>
<input id="securityEmail" name="email" size="25" type="text" data-gtm-form-interact-field-id="0">
<span class="subscriptionerrorMsg sa-validation-alerts" tabindex="0"></span>
<input name="email-button" class="sa-subscription-modal-button sa-subscription-submit-button" type="submit" onclick="s_objectID='content_advisories : : 0';" value="Submit">
</form>
Text Content
Skip to Promo Skip to main content Global Search SUGGESTED SEARCHES Store Login Cloud Services Console Customer Connect Partner Connect * Products * Solutions * Partners * Resources Main Menu Cloud Services Console Customer Connect Partner Connect Search CONTACT SALES Global Search SUGGESTED SEARCHES Main Menu CLOUD INFRASTRUCTURE Fully integrated infrastructure solutions. VMWARE CLOUD FOUNDATION Scalable, elastic private cloud IaaS solution. KEY TECHNOLOGIES: vSphere | vSAN | NSX | Aria VMWARE VSPHERE FOUNDATION Enterprise workload engine with intelligent operations. KEY TECHNOLOGIES: vSphere | Aria ADD-ON: Live Recovery ANYWHERE WORKSPACE Access any app on any device securely. * Horizon * Workspace ONE APP PLATFORMS Build, deploy, manage and scale modern apps. * VMware Tanzu SECURITY AND LOAD BALANCING Zero trust lateral security and software-defined app delivery. * VMware Avi Load Balancer * VMware NSX Distributed Firewall * VMware NSX Advanced Threat Prevention SOFTWARE-DEFINED EDGE Empower distributed workloads with infrastructure and management. * Edge Compute Stack * VeloCloud SD-WAN * Telco Cloud RUN VMWARE ON ANY CLOUD. ANY ENVIRONMENT. ANYWHERE. ON PUBLIC & HYBRID CLOUDS * Alibaba Cloud VMware Service * Azure VMware Solution * Google Cloud VMware Engine * IBM Cloud for VMware Solutions * Oracle Cloud VMware Solutions * VMware Cloud on AWS * VMware Verified Cloud Providers DESKTOP HYPERVISOR Develop and test in a local virtualization sandbox. * Fusion for Mac * Workstation Player * Workstation Pro SEE ALL PRODUCTS Main Menu SOLUTIONS ANYWHERE WORKSPACE ACCESS ANY APP ON ANY DEVICE SECURELY APP PLATFORM BUILD AND OPERATE CLOUD NATIVE APPS CLOUD INFRASTRUCTURE RUN ENTERPRISE APPS ANYWHERE CLOUD MANAGEMENT AUTOMATE AND OPTIMIZE APPS AND CLOUDS EDGE INFRASTRUCTURE ENABLE THE MULTI-CLOUD EDGE NETWORKING ENABLE CONNECTIVITY FOR APPS AND CLOUDS SECURITY SECURE APPS AND CLOUDS BY INDUSTRY * Communications Service Providers * Department of Defense * Federal Government * Financial Services * Healthcare Providers * State and Local Government VMWARE AI SOLUTIONS Accelerate and ensure the success of your generative AI initiatives with multi-cloud flexibility, choice, privacy and control. LEARN MORE SEE ALL SOLUTIONS SEE ALL INDUSTRIES Main Menu FOR CUSTOMERS * Find a Cloud Provider * Find a Partner * VMware Marketplace * Work with a Partner FOR PARTNERS * Become a Cloud Provider * Cloud Partner Navigator * Get Cloud Verified * Learning and Selling Resources * Partner Connect Login * Partner Executive Edge * Technology Partner Hub * Work with VMware WORKING TOGETHER WITH PARTNERS FOR CUSTOMER SUCCESS A new, simplified partner program to help achieve even greater opportunities for profitability. READ NEW PARTNER FAQ Main Menu TOOLS & TRAINING * VMware Customer Connect * VMware Trust Center * Learning & Certification * Tech Zone * Product Downloads * Product Trials * Cloud Services Engagement Platform * Hands-on Labs SERVICES * Professional Services * Customer Success SUPPORT * VMware Customer Connect * Support Offerings * Skyline * Support Customer Welcome Center MARKETPLACE * Cloud Marketplace * VMware Marketplace VIDEOS * VMware Video Library * VMware Explore Video Library BLOGS & COMMUNITIES * Blogs * Podcasts * News & Stories * Communities CUSTOMERS * Customer Stories EVENTS * VMware Explore * SpringOne * All Events & Webcasts SEE ALL RESOURCES Important Advisory ID: VMSA-2024-0008 CVSSv3 Range: 7.4-4.8 Issue Date: 2024-04-02 Updated On: 2024-04-02 (Initial Advisory) CVE(s): CVE-2024-22246, CVE-2024-22247, CVE-2024-22248 Synopsis: VMware SD-WAN Edge and SD-WAN Orchestrator updates address multiple security vulnerabilities. RSS Feed Download PDF Download Text File Share this page on social media: Sign up for Security Advisories SIGN UP FOR SECURITY ADVISORIES Stay up to date on the latest VMware Security advisories and updates. Close *Email 1. IMPACTED PRODUCTS VMware SD-WAN Edge VMware SD-WAN Orchestrator 2. INTRODUCTION Multiple vulnerabilities in VMware SD-WAN were privately reported to VMware. Patches and instructions are available to remediate the vulnerabilities in affected VMware products. 3A. UNAUTHENTICATED COMMAND INJECTION VULNERABILITY IN SD-WAN EDGE (CVE-2024-22246) Description VMware SD-WAN Edge contains an unauthenticated command injection vulnerability potentially leading to remote code execution. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.4. Known Attack Vectors A malicious actor with local access to the Edge Router UI during activation may be able to perform a command injection attack that could lead to full control of the router. Resolution To remediate CVE-2024-22246 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below. Workarounds None. Additional Documentation None Notes None. Acknowledgements VMware would like to thank Saif Aziz (@wr3nchsr) from CyShield for reporting this issue to us. 3B. MISSING AUTHENTICATION AND PROTECTION MECHANISM VULNERABILITY IN SD-WAN EDGE (CVE-2024-22247) Description VMware SD-WAN Edge contains a missing authentication and protection mechanism vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.8. Known Attack Vectors A malicious actor with physical access to the SD-WAN Edge appliance during activation can potentially exploit this vulnerability to access the BIOS configuration. In addition, the malicious actor may be able to exploit the default boot priority configured. Resolution To remediate CVE-2024-22247 apply the instructions listed in the 'Fixed Version' column of the 'Response Matrix' found below. Workarounds None. Additional Documentation None. Notes None. Acknowledgements VMware would like to thank Saif Aziz (@wr3nchsr) from CyShield for reporting this issue to us. 3C. OPEN REDIRECT VULNERABILITY IN SD-WAN ORCHESTRATOR (CVE-2024-22248) Description VMware SD-WAN Orchestrator contains an open redirect vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.1. Known Attack Vectors A malicious actor may be able to redirect a victim to an attacker controlled domain due to improper path handling leading to sensitive information disclosure. Resolution To remediate CVE-2024-22248 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below. Workarounds None. Additional Documentation None. Notes None. Acknowledgements VMware would like to thank Abdelrahman Adel (@K4r1it0) from CyShield for reporting this issue to us. Response Matrix Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation VMware SD-WAN (Edge) 5.x Any CVE-2024-22246 7.4 important 5.0.1+ N/A N/A VMware SD-WAN (Edge) 4.5.x Any CVE-2024-22246 7.4 important 4.5.1+ N/A N/A VMware SD-WAN (Edge) 4.5.x/5.x Any CVE-2024-22247 4.8 moderate KB97391 N/A N/A VMware SD-WAN (Edge) Any Any CVE-2024-22248 N/A N/A Unaffected N/A N/A VMware SD-WAN (Orchestrator) Any Any CVE-2024-22246, CVE-2024-22247 N/A N/A Unaffected N/A N/A VMware SD-WAN (Orchestrator) 5.x Any CVE-2024-22248 7.1 important 5.0.1+ N/A N/A 4. REFERENCES https://docs.vmware.com/en/VMware-SASE/5.4.0/rn/vmware-sase-540-release-notes/index.html https://docs.vmware.com/en/VMware-SASE/5.3.0/rn/vmware-sase-530-release-notes/index.html https://docs.vmware.com/en/VMware-SASE/5.2.0/rn/vmware-sase-520-release-notes/index.html https://docs.vmware.com/en/VMware-SASE/5.1.0/rn/vmware-sase-510-release-notes/index.html https://docs.vmware.com/en/VMware-SASE/5.0.0/rn/VMware-SASE-5000-Release-Notes.html Mitre CVE Dictionary Links: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22246 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22247 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22248 FIRST CVSSv3 Calculator: CVE-2024-22246: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2024-22247: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:P/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:H CVE-2024-22248: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:L/A:N 5. CHANGE LOG 2024-04-02 VMSA-2024-0008 Initial security advisory. 6. CONTACT E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories http://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2024 Broadcom. All rights reserved. Company * About Us * Executive Leadership * News & Stories * Investor Relations * Customer Stories * Diversity, Equity & Inclusion * Environment, Social & Governance * AI at VMware * Careers * Blogs * Communities * Acquisitions * Office Locations * VMware Cloud Trust Center * COVID-19 Resources Support * VMware Customer Connect * Support Policies * Product Documentation * Compatibility Guide * Terms & Conditions * California Transparency Act Statement * Hands-on Labs & Trials * Twitter * YouTube * Facebook * LinkedIn * Contact Sales -------------------------------------------------------------------------------- Copyright © 2005-2024 Broadcom. All Rights Reserved. The term “Broadcom” refers to Broadcom Inc. and/or its subsidiaries. Terms of Use Your California Privacy Rights Privacy Accessibility Trademarks Glossary Help Feedback Cookies Settings WE CARE ABOUT YOUR PRIVACY We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. If you want to know more about how we use cookies, please see our Cookie Policy. Cookies Settings Reject All Accept All Cookies COOKIE PREFERENCE CENTER * GENERAL INFORMATION ON COOKIES * STRICTLY NECESSARY * PERFORMANCE * FUNCTIONAL * ADVERTISING GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. STRICTLY NECESSARY Always Active Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookies Details PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookies Details FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookies Details ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word word mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1 mmMwWLliI0fiflO&1