VMware Fixes Severe Carbon Black App Control Authentication Bypass Vulnerability

VMware Fixes Severe Carbon Black App Control Authentication Bypass Vulnerability

This week, American cloud computing and virtualization technology company VMware has patched a severe vulnerability in VMware Carbon Black App Control (AppC).


According to the security advisory, cybercriminals with access to the VMware Carbon Black App Control management server might be able to acquire administrative access to the product without the need to authenticate.


Carbon Black App Control is created for corporate environments, to lock down critical systems and servers to avert undesired changes and ensure continuous compliance with regulatory mandates.


CVE-2021-21998 flaw is an authentication bypass that is impacting VMware Carbon Black App Control (AppC) versions 8.0, 8.1, 8.5 prior to 8.5.8, and 8.6 prior to 8.6.2.


Given the part played by the product in a corporate network, gaining control of the AppC management server could lead to critical systems damage.


Depending on the environment, a threat actor could use the vulnerability to maximum advantage to attack anything from Point-of-Sales (PoS) to industrial control systems.


VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.4.


There are no workarounds available, and to remediate the issue you have to apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.


Product
Version
Running On
CVE Identifier
CVSSv3
Severity
Fixed Version
Version Workarounds
Additional Documentation
AppC
8.6.x
Windows
CVE-2021-21998
9.4
critical
8.6.2
None
None
AppC
8.5.x
Windows
CVE-2021-21998
9.4
critical
8.5.8
None
None
AppC
8.1.x, 8.0.x
Windows
CVE-2021-21998
9.4
critical
Hotfix
None
None

Apart from fixing CVE-2021-21998, the tech company also published a security advisory for a high-risk bug in VMware Tools, VMware Remote Console for Windows (VMRC), and ..

Support the originator by clicking the read the rest link below.