An authenticated, high privileged malicious actor with network access to the VMware Cloud Director tenant or provider may be able to exploit a remote code execution vulnerability to gain access to the server.
                
            References
                    | Link | Resource | 
|---|---|
| https://www.vmware.com/security/advisories/VMSA-2022-0013.html | Patch Release Notes Vendor Advisory | 
| https://www.vmware.com/security/advisories/VMSA-2022-0013.html | Patch Release Notes Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    21 Nov 2024, 06:47
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://www.vmware.com/security/advisories/VMSA-2022-0013.html - Patch, Release Notes, Vendor Advisory | 
22 Apr 2022, 15:54
| Type | Values Removed | Values Added | 
|---|---|---|
| CWE | NVD-CWE-noinfo | |
| References | (MISC) https://www.vmware.com/security/advisories/VMSA-2022-0013.html - Patch, Release Notes, Vendor Advisory | |
| CVSS | v2 : v3 : | v2 : 6.5 v3 : 7.2 | 
| CPE | cpe:2.3:a:vmware:vcloud_director:*:*:*:*:*:*:*:* | 
14 Apr 2022, 21:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2022-04-14 21:15
Updated : 2024-11-21 06:47
NVD link : CVE-2022-22966
Mitre link : CVE-2022-22966
CVE.ORG link : CVE-2022-22966
JSON object : View
Products Affected
                vmware
- vcloud_director
CWE
                