CVE-2021-39144: VMware Patches Critical Cloud Foundation Vulnerability in XStream Open Source Library

VMware issues patches for end-of-life versions of Cloud Foundation Network Security Virtualization for vSphere (NSX-V) to address a critical vulnerability in an open source library.

Background

On October 25, VMware published VMSA-2022-0027, an advisory for multiple vulnerabilities in its VMware Cloud Foundation solution.

CVE
Description
CVSSv3
CVE-2021-39144
VMware Cloud Foundation XStream Library Deserialization of Untrusted Data Vulnerability
9.8
CVE-2022-31678
VMware Cloud Foundation XML External Entity (XXE) Vulnerability
5.3

Analysis

CVE-2021-39144 is a remote code execution vulnerability in XStream, an open source library used for object serialization. This vulnerability was originally patched on August 22, 2021 in XStream version 1.4.18. VMware Cloud Foundation uses XStream for input serialization in its Network Security Virtualization for vSphere (NSX-V) solution. An attacker could exploit this vulnerability by targeting an unauthenticated endpoint in NSX-V to gain remote code execution privileges as root.

CVE-2022-31678 is an XXE vulnerability in VMware Cloud Foundation NSX-V. A remote, unauthenticated attacker could exploit this vulnerability to cause a denial-of-service condition or cause an unintended information disclosure. It is a moderately rated vulnerability, receiving a CVSSv3 score of 5.3.

VMware issues fix for end-of-life versions of NSX-V

In August 2021, VMware announced that general support for NSX-V would end on January 16, 2022 and that technical guidance would end on January 16, 2023. However, in its advisory, VMware notes that “due to the critical severity of NSX-V” a patch was made available to address both flaws.

While no specific details about CVE-2021-39144 were made public by VMware, the fact that they highlighted the attack vector as a “unauthenticated endpoint […] in VMware Cloud Foundation (NSX-V)” coupled with the decision to release a patch for an end-of-life product, suggests that exploitation of this flaw is straightforward.

Supply chain attacks remain a major area of concern

The presence of this vulnerability in the XStream library and its use in VMware Cloud Foundation NSX-V evokes memories of Log4Shell. While CVE-2021-39144 is not the same caliber as Log4Shell, it serves as a reminder of the challenges supply chain vulnerabilities pose to an organization’s security posture.

Proof of concept

The discovery of both flaws are attributed to researchers Steven Seeley of Source Incite and Sina Kheirkhah of MDSec. A blog post was published on Source Incite that details their findings. The blog post includes a proof-of-concept exploit script that can be used to get a reverse shell on a vulnerable VMware Cloud Foundation NSX-V instance.

Solution

VMware Cloud Foundation 4.x is not affected by either CVE-2021-39144 or CVE-2022-31678. However, VMware’s advisory notes that VMware Cloud Foundation (NSX-V) versions 3.x are affected:

Affected Versions
Patching Instructions
VMware Cloud Foundation prior to 3.9.1
Update to VMware Cloud Foundation 3.11.0.1 and above and apply workaround instructions
VMware Cloud Foundation 3.9.1 and above
Follow workaround instructions

For customers using VMware Cloud Foundation versions prior to 3.9.1, VMware recommends updating to VMware Cloud Foundation 3.11.0.1 first. Once updated, customers are instructed to follow VMware’s workaround instructions in the Knowledge Base article, Applying NSX-V 6.4.14 patch on VMware Cloud Foundation 3.x (89809).

Identifying affected systems

A list of Tenable plugins to identify these vulnerabilities will appear here as they’re released. This link uses a search filter to ensure that all matching plugin coverage will appear as it is released. Additionally, plugin coverage specific to the XStream library (CVE-2021-39144) can be found here.

Get more information

VMSA-2022-0027: VMware Advisory for CVE-2021-39144, CVE-2022-31678
Source Incite Blog Post on CVE-2021-39144 by Sina Kheirkhah
XStream Advisory for CVE-2021-39144

Join Tenable’s Security Response Team on the Tenable Community.

Learn more about Tenable, the first Cyber Exposure platform for holistic management of your modern attack surface.

Get a free 30-day trial of Tenable.io Vulnerability Management.

  

​Cyber Exposure Alerts Read More 

More To Explore

We can help improve your Business

Ensure your Organization Assets are well  protected in front of the Cyber Attacks

Delivery Workflow

Register for Free and get your test done withn 24 to 48 hours

See Workflow

Sample Report

Here is a sample report of a Security Testing Engagement

See Sample Report PDF

Work Request

Order your security test and Get Your Report

Get Your Test Report
Generated by Feedzy

1. Client Onboarding

Access to all of Cyber Legion's services is provided through the Web Secure Client Portal. To create a Free account, you can sign up through the portal, or contact the Cyber Legion team and they will set up an account for you.

2. NDA , Agreements & Digital Signature

The integration of Digital Signature in our Web Client Portal allows us to legally sign all necessary documents and agreements, enabling us to carry out security assessments on targeted systems.

3. Submit Work Request

Our pricing structure is adaptable to meet the needs of all clients. By filling out the Work Request Form, you can select from pre-existing services or request a personalized proposal.

The Cyber Legion team will acknowledge your order, set up a project in your account, and proceed with the testing and delivery.

4. Security Testing & Report

We meet agreed upon SLAs and follow security testing framework checklists. Based on our commitment, our team of engineers will utilize all of our tools, automation, and testing capabilities to achieve the objectives.

Within the agreed upon timeframe, you will receive a report on the security test that was conducted, including the results, recommendations, and references for addressing any identified issues.

5. Retesting & Validation of Remediation

We not only identify potential threats, risks, and vulnerabilities, but also provide detailed recommendations for resolution. To ensure complete remediation, we offer complimentary retesting and a range of ongoing security testing options for continued vulnerability detection and verification.