VMware SD-WAN Vulnerabilities Pose Risk to Network Security, Patches Released

VMware has released critical security patches to address multiple vulnerabilities in its SD-WAN (Software-Defined Wide Area Network) solution. These vulnerabilities, if left unpatched, could present significant risks to organizations relying on VMware SD-WAN for managing their network connections.

VMware SD-WAN Vulnerabilities

Critical Vulnerabilities and Risks

The following vulnerabilities, reported by security researchers Saif Aziz (@wr3nchsr) and Abdelrahman Adel (@K4r1it0) from CyShield, have been identified and addressed:

  • CVE-2024-22246: Unauthenticated Command Injection (CVSS 7.4) A flaw in the VMware SD-WAN Edge component could allow unauthenticated attackers with local access to execute arbitrary commands, potentially seizing full control of the router.
  • CVE-2024-22247: BIOS Boot Modification (CVSS 4.8) Through physical access to an appliance, attackers could alter the BIOS boot priority, potentially leading to the execution of malicious code during startup.
  • CVE-2024-22248: Open Redirect (CVSS 7.1) The VMware SD-WAN Orchestrator is susceptible to an open redirect vulnerability, which an attacker could exploit to redirect users to malicious websites for phishing attacks or malware delivery.

The Importance of Patching

VMware strongly urges organizations utilizing VMware SD-WAN to apply the available patches immediately. Unpatched systems remain vulnerable to potential exploitation, which could lead to:

  • Compromised Network Devices: Attackers gaining control of edge routers can disrupt network communications or intercept sensitive data.
  • Unauthorized Access: Successful exploitation could provide a foothold into an organization’s network, potentially facilitating further attacks.
  • Malicious Redirects: The open redirect flaw could be used to trick users into visiting phishing sites or inadvertently downloading malware.

Call to Action

Administrators responsible for VMware SD-WAN are advised to prioritize the installation of the provided patches. Details on the fixes and the affected versions can be found in the official VMware Security Advisory.