VMWare addressed Several Vulnerabilities in SD-WAN

VMWare addressed Several Vulnerabilities in SD-WAN


VMware has released critical security patches to address multiple vulnerabilities in its SD-WAN solution. These vulnerabilities, if left unpatched, could present significant risks to organizations relying on VMware SD-WAN for managing their network connections.

The first vulnerability is tracked as CVE-2024-22246 with a CVSS score of 7.4 is an Unauthenticated Command Injection flaw in the VMware SD-WAN Edge component could allow unauthenticated attackers with local access to execute arbitrary commands, potentially seizing full control of the router.

The second vulnerability is tracked as CVE-2024-22247 with a CVSS score of 4.8 is a BIOS Boot Modification through physical access to an appliance, attackers could alter the BIOS boot priority, potentially leading to the execution of malicious code during startup.

Advertisements

The third vulnerability is tracked as CVE-2024-22248 with a CVSS score of 7.1 is an Open Redirect flaw. The VMware SD-WAN Orchestrator is susceptible to an open redirect vulnerability, which an attacker could exploit to redirect users to malicious websites for phishing attacks or malware delivery.

VMware strongly urges organizations utilizing VMware SD-WAN to apply the available patches immediately. Unpatched systems remain vulnerable to potential exploitation.

Administrators responsible for VMware SD-WAN are advised to prioritize the installation of the provided patches. Details on the fixes and the affected versions can be found in the official VMware Security Advisory.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.