VMware has recently disclosed a critical authentication bypass vulnerability, known as CVE-202334060  , that affects its Cloud Director Appliance. This vulnerability allows malicious actors with network access to bypass login restrictions on port 22 (ssh) or port 5480 (appliance management console) for upgraded versions of VMware Cloud Director Appliance 10.5 .
The vulnerability arises from a misconfiguration in the login process , which enables unauthorized access to the appliance . It is important to note that fresh installations of version 10.5 are not affected by CVE-202334060. The vulnerability primarily stems from the use of an affected version of the System Security Services Daemon (SSSD) in the underlying Photon OS, a Linux-based operating system .
VMware is currently developing a patch to address this vulnerability. In the meantime , they have provided a temporary workaround for users to apply. This workaround involves downloading a custom script to modify the appliance’s login process and prevent exploitation . It is worth mentioning that there have been no known exploitations of this vulnerability at this time.
To ensure the security of their systems, VMware advises customers to stay updated on any developments regarding this vulnerability. They can do so by signing up for VMware’s security advisory mailing list. While the impact of this vulnerability is significant, VMware’s prompt response and provision of a temporary workaround demonstrate their commitment to addressing the issue. Users should apply the provided workaround until the patch is released. By following VMware’s guidance and staying informed, customers can mitigate the risks associated with CVE-202334060 and protect their systems from potential unauthorized access.