CVE-2021-22024

Severity CVSS v4.0:
Pending analysis
Type:
CWE-532 Information Exposure Through Log Files
Publication date:
30/08/2021
Last modified:
01/02/2022

Description

The vRealize Operations Manager API (8.x prior to 8.5) contains an arbitrary log-file read vulnerability. An unauthenticated malicious actor with network access to the vRealize Operations Manager API can read any log file resulting in sensitive information disclosure.

Vulnerable products and versions

CPE From Up to
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* 3.0 (including) 3.10.2.1 (including)
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* 4.0 (including) 4.2.1 (including)
cpe:2.3:a:vmware:vrealize_operations_manager:*:*:*:*:*:*:*:* 8.0.0 (including) 8.5.0 (excluding)
cpe:2.3:a:vmware:vrealize_operations_manager:7.5.0:*:*:*:*:*:*:*
cpe:2.3:a:vmware:vrealize_suite_lifecycle_manager:*:*:*:*:*:*:*:* 8.0 (including) 8.2 (including)


References to Advisories, Solutions, and Tools