VMware ESXi contains a TOCTOU (Time-of-check Time-of-use) vulnerability that exists in the way temporary files are handled. A malicious actor with access to settingsd, may exploit this issue to escalate their privileges by writing arbitrary files.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2022-0004.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
24 Feb 2022, 19:51
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) https://www.vmware.com/security/advisories/VMSA-2022-0004.html - Patch, Vendor Advisory | |
CWE | CWE-367 | |
CVSS |
v2 : v3 : |
v2 : 6.0
v3 : 7.5 |
CPE | cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* |
16 Feb 2022, 18:00
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-02-16 17:15
Updated : 2024-02-04 22:29
NVD link : CVE-2021-22043
Mitre link : CVE-2021-22043
CVE.ORG link : CVE-2021-22043
JSON object : View
Products Affected
vmware
- esxi
- fusion
CWE
CWE-367
Time-of-check Time-of-use (TOCTOU) Race Condition