Looking for the vulnerability index of Invicti's legacy products?
VMware vRealize Operations Server Side Request Forgery (SSRF) vulnerability - Vulnerability Database

VMware vRealize Operations Server Side Request Forgery (SSRF) vulnerability

Description

VMware vRealize Operations Manager contains a Server Side Request Forgery (SSRF) vulnerability in its API interface. This flaw allows an unauthenticated attacker to manipulate the server into making unauthorized requests to internal or external resources. The vulnerability affects VMware vRealize Operations, VMware Cloud Foundation, and vRealize Suite Lifecycle Manager. SSRF vulnerabilities are particularly dangerous as they can bypass network security controls and expose internal systems that would otherwise be inaccessible from external networks.

Remediation

Apply security updates immediately by following these steps:

  1. Identify all affected VMware vRealize Operations, Cloud Foundation, and vRealize Suite Lifecycle Manager instances in your environment
  2. Review VMware Security Advisory VMSA-2021-0004.1 for specific version numbers and patch details
  3. Schedule a maintenance window and create backups of all affected systems before upgrading
  4. Upgrade to the patched versions as specified in the VMware advisory
  5. Verify the patch installation and confirm the API is functioning correctly post-upgrade
As an interim mitigation measure if immediate patching is not possible:
  • Restrict network access to the vRealize Operations Manager API to trusted IP addresses only using firewall rules or network segmentation
  • Monitor API access logs for suspicious request patterns or unusual internal resource access attempts
  • Implement additional authentication controls at the network perimeter