VMware Security Advisory ID: VMSA-2020-0006.1
Direct Link: https://www.vmware.com/ca/security/advisories/VMSA-2020-0006.html
Synopsis
VMware vCenter Server updates address-sensitive information disclosure vulnerability in the VMware Directory Service (vmdir) (CVE-2020-3952).
Description
Under certain conditions, the vmdir that ships with VMware vCenter Server as part of an embedded or external Platform Services Controller (PSC) does not correctly implement access controls. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 10.0.
Known attack vectors
A malicious actor with network access to port 389 on an affected vmdir deployment may be able to extract highly sensitive information such as administrative account credentials which could be used to compromise vCenter Server or other services that are dependent upon vmdir for authentication. Variant attack vectors such as creating new attacker-controlled administrative accounts are also possible.
Resolution
To remediate this vulnerability, follow VMware’s Knowledge Base Article to determine if your vCenter deployment is affected and apply VMware’s recommended updates as specified in their Security Advisory.
HyAlto considerations
HyAlto users have no way of interacting with vmdir in vCenter Server using HyAlto, however, improper network configurations in vCenter could conceivably allow a customer’s virtual machine access to the vCenter Server management network and, consequently, vmdir.
HyAlto recommends following VMware’s Network Isolation Practices to ensure customer networks are isolated from vCenter management and infrastructure networks.