현재 상당한 이슈가 되고 있는 Apache Log4j Remote Code Execution (CVE-2021-44288) 취약점에 대한 VMware 제품 대응 가이드가 발표되었습니다. 각각 제품군마다 다르겠지만, 사전에 작업을 진행 할 수 있는 Workaround 가 제품군별로 가이드되어 있습니다. 현재 업데이트된 영향을 받는 제품군은 다음과 같습니다.
Impacted Products (Under Evaluation)
- VMware Horizon
- VMware vCenter Server
- VMware HCX
- VMware NSX-T Data Center
- VMware Unified Access Gateway
- VMware WorkspaceOne Access
- VMware Identity Manager
- VMware vRealize Operations
- VMware vRealize Operations Cloud Proxy
- VMware vRealize Log Insight
- VMware vRealize Automation
- VMware vRealize Lifecycle Manager
- VMware Telco Cloud Automation
- VMware Site Recovery Manager
- VMware Carbon Black Cloud Workload Appliance
- VMware Carbon Black EDR Server
- VMware Tanzu GemFire
- VMware Tanzu Greenplum
- VMware Tanzu Operations Manager
- VMware Tanzu Application Service for VMs
- VMware Tanzu Kubernetes Grid Integrated Edition
- VMware Tanzu Observability by Wavefront Nozzle
- Healthwatch for Tanzu Application Service
- Spring Cloud Services for VMware Tanzu
- Spring Cloud Gateway for VMware Tanzu
- Spring Cloud Gateway for Kubernetes
- API Portal for VMware Tanzu
- Single Sign-On for VMware Tanzu Application Service
- App Metrics
- VMware vCenter Cloud Gateway
- VMware Tanzu SQL with MySQL for VMs
- VMware vRealize Orchestrator
- VMware Cloud Foundation
- VMware Workspace ONE Access Connector
- VMware Horizon DaaS
- (Additional products will be added)
관련 픽스패치는 현재 기준으로 Pending status로 표기가 되어있으며, 앞서 말씀드린것 처럼 제품군 별로 log4j의 nslookup을 막아버리는 Workaround 를 가이드하고있습니다.
이하 첨부 시트의 워크어라운드 및 상단 링크의 원문을 참조 부탁드립니다.
Response Matrix:
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware Horizon
|
8.x, 7.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware vCenter Server
|
7.x, 6.x
|
Virtual Appliance
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware vCenter Server
|
6.x
|
Windows
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware HCX
|
4.x, 3.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware NSX-T Data Center
|
3.x, 2.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Unified Access Gateway
|
21.x, 20.x, 3.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Workspace ONE Access
|
21.x, 20.10.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Identity Manager
|
3.3.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware vRealize Operations
|
8.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware vRealize Operations Cloud Proxy
|
Any
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware vRealize Log Insight
|
8.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware vRealize Automation
|
8.x, 7.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware vRealize Lifecycle Manager
|
8.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware Telco Cloud Automation
|
2.x, 1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware Carbon Black Cloud Workload Appliance
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Carbon Black EDR Server
|
7.x, 6.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Site Recovery Manager
|
8.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware Tanzu GemFire
|
9.x, 8.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Tanzu Greenplum
|
6.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Tanzu Operations Manager
|
2.x
|
Any
|
CVE-2021-44228
|
Critical
|
None
|
|||
VMware Tanzu Application Service for VMs
|
2.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Tanzu Kubernetes Grid Integrated Edition
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Tanzu Observability by Wavefront Nozzle
|
3.x, 2.x
|
Any
|
CVE-2021-44228
|
Critical
|
None
|
None
|
||
Healthwatch for Tanzu Application Service
|
2.x, 1.x
|
Any
|
CVE-2021-44228
|
Critical
|
None
|
None
|
||
Spring Cloud Services for VMware Tanzu
|
3.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
Spring Cloud Gateway for VMware Tanzu
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
Spring Cloud Gateway for Kubernetes
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
API Portal for VMware Tanzu
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
Single Sign-On for VMware Tanzu Application Service
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
App Metrics
|
2.x
|
Any
|
CVE-2021-44228
|
Critical
|
None
|
None
|
||
VMware vCenter Cloud Gateway
|
1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Tanzu SQL with MySQL for VMs
|
2.x, 1.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware vRealize Orchestrator
|
8.x, 7.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
|
VMware Cloud Foundation
|
4.x, 3.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Workspace ONE Access Connector (VMware Identity Manager Connector)
|
21.x, 20.10.x, 19.03.0.1
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
None
|
||
VMware Horizon DaaS
|
9.1.x, 9.0.x
|
Any
|
CVE-2021-44228
|
Critical
|
Patch Pending
|
Workaround Pending
|
None
|
log4j 유틸리티를 범용적으로 사용하다 보니, VMware도 영향을 받는 제품군이 상당히 많습니다... 다행히도 esxi는 해당되지 않습니다.
(이곳을 참조하시면, 대상이 되지 않는 제품군을 확인하실 수 있습니다)
취약점 대상제품군이 누구나 접근할 수있는 공용망에 공개가 되어있다면 신속하게 조치하는것을 권고드립니다.
관련하여 관심이 가는 제품군의 워크어라운드를 참조하여 사전 작업 겸 포스팅할 예정입니다.
Update 12/14
vCenter Server Appliance의 Workaround 작업에 대한 스크립트가 제공되었습니다.
다들 고생이 많은 12월이 되겠군요 -.-;
다음 포스팅에 뵙겠습니다.
감사합니다.
반응형