Critical
Share this page on social media
Sign up for Security Advisories
Critical vulnerabilities in Apache Log4j identified by CVE-2021-44228 and CVE-2021-45046 have been publicly disclosed which impact VMware products.
Description
Multiple products impacted by remote code execution vulnerabilities via Apache Log4j (CVE-2021-44228, CVE-2021-45046).
Known Attack Vectors
A malicious actor with network access to an impacted VMware product may exploit these issues to gain full control of the target system.
Resolution
Fixes for CVE-2021-44228 and CVE-2021-45046 are documented in the 'Fixed Version' column of the 'Response Matrix' below.
Workarounds
Workarounds for CVE-2021-44228 and CVE-2021-45046 are documented in the 'Workarounds' column of the 'Response Matrix' below.
Additional Documentation
None.
Acknowledgements
None.
Notes
Response Matrix:
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware Horizon
|
8.x, 7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vCenter Server
|
7.x
|
Virtual Appliance
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vCenter Server
|
6.7.x
|
Virtual Appliance
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vCenter Server
|
6.7.x
|
Windows
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vCenter Server
|
6.5.x
|
Virtual Appliance
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vCenter Server
|
6.5.x
|
Windows
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Cloud Foundation
|
4.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Cloud Foundation
|
3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware HCX
|
4.3
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
N/A
|
N/A
|
N/A
|
N/A
|
|
VMware HCX
|
4.2.x, 4.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware HCX
|
4.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware NSX-T Data Center
|
3.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware NSX-T Data Center
|
3.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware NSX-T Data Center
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Unified Access Gateway
|
21.x, 20.x, 3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Workspace ONE Access
|
21.x, 20.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Identity Manager
|
3.3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Site Recovery Manager, vSphere Replication
|
8.5.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Site Recovery Manager, vSphere Replication
|
8.4.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Site Recovery Manager, vSphere Replication
|
8.3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vCenter Cloud Gateway
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Workspace ONE Access Connector (VMware Identity Manager Connector)
|
21.08.0.1, 21.08, 20.10, 19.03.0.1
|
Windows
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Horizon DaaS
|
9.1.x, 9.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Horizon Cloud Connector
|
1.x, 2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
VMware NSX Data Center for vSphere
|
6.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware AppDefense Appliance
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
N/A
|
None
|
|
VMware Cloud Director Object Storage Extension
|
2.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Cloud Director Object Storage Extension
|
2.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Telco Cloud Operations
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Smart Assurance NCM
|
10.1.6.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Smart Assurance SAM [Service Assurance Manager]
|
10.1.5
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Smart Assurance SAM [Service Assurance Manager]
|
10.1.2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Smart Assurance SAM [Service Assurance Manager]
|
10.1.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Integrated OpenStack
|
7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Cloud Provider Lifecycle Manager
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware SD-WAN VCO
|
4.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware NSX Intelligence
|
1.2.x, 1.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Horizon Agents Installer
|
21.x.x, 20.x.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Smart Assurance M&R
|
9.6-6.8u5, 10.1.2-7.0u8, 10.1.5-7.2
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware Carbon Black Cloud Workload Appliance
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Carbon Black EDR Server
|
7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware vRealize Automation
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Automation
|
7.6
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Business for Cloud
|
7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Lifecycle Manager
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Log Insight
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Network Insight
|
6.x, 5.3
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Operations
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Operations Cloud (Cloud Proxy)
|
Any
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Operations Tenant App for VMware Cloud Director
|
2.5
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Orchestrator
|
8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Orchestrator
|
7.6
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize True Visibility Suite
|
Any
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware vRealize Operations Management Pack
|
Any
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
App Metrics
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
API Portal for VMware Tanzu
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Healthwatch for Tanzu Application Service
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Healthwatch for Tanzu Application Service
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Single Sign-On for VMware Tanzu Application Service
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Spring Cloud Gateway for Kubernetes
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Spring Cloud Gateway for VMware Tanzu
|
1.1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Spring Cloud Gateway for VMware Tanzu
|
1.0.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
Spring Cloud Services for VMware Tanzu
|
3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
!0.0, 9.0
|
critical
|
None
|
None
|
|
Spring Cloud Services for VMware Tanzu
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
VMware Greenplum Text
|
3.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Harbor Container Registry for TKGI
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.12.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.11.x
|
Any
|
CVE-2021-44228, CVE-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.9.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.8.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Application Service for VMs
|
2.7.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu GemFire
|
9.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu GemFire
|
9.9.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu GemFire for VMs
|
1.14.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu GemFire for VMs
|
1.13.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu GemFire for VMs
|
1.12.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Greenplum Platform Extension Framework
|
6.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Kubernetes Grid Integrated Edition
|
1.13.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Kubernetes Grid Integrated Edition
|
1.10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Observability by Wavefront Nozzle
|
3.x, 2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
None
|
|
VMware Tanzu Observability Proxy
|
10.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Operations Manager
|
2.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
||
VMware Tanzu Scheduler
|
1.x
|
Any
|
CVE-2021-44228, CVE-2021-45046
|
10.0, 9.0
|
critical
|
None
|
FIRST CVSSv3 Calculator:
CVE-2021-44228: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H (10.0)
CVE-2021-45046: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H (9.0)
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-45046
2021-12-10: VMSA-2021-0028
Initial security advisory.
2021-12-11: VMSA-2021-0028.1
Updated advisory with workaround information for multiple products including vCenter Server Appliance, vRealize Operations, Horizon, vRealize Log Insight, Unified Access Gateway.
2021-12-13: VMSA-2021-0028.2
Revised advisory with updates to multiple products.
2021-12-15: VMSA-2021-0028.3
Revised advisory with updates to multiple products. In addition, added CVE-2021-45046 information and noted alignment with new Apache Software Foundation guidance.
2021-12-17: VMSA-2021-0028.4
Revised advisory with updates to multiple products.
2021-12-20: VMSA-2021-0028.5
Added a note on current CVE-2021-45105 investigations.
2021-12-21: VMSA-2021-0028.6
Revised advisory with updates to multiple products, including vRealize Operations and vRealize Log Insight.
2021-12-22: VMSA-2021-0028.7
Revised advisory with updates to multiple products, including HCX.
2021-12-24: VMSA-2021-0028.8
Revised advisory with updates to multiple products, including NSX-T, TKGI and Greenplum.
2022-01-19: VMSA-2021-0028.9
Revised advisory with updates to multiple products, including vRealize Automation, vRealize Orchestrator, NSX Intelligence, and vRealize Lifecycle Manager.
2022-01-27: VMSA-2021-0028.10
Revised advisory with updates to multiple products, including vCenter Server.
2022-02-08: VMSA-2021-0028.11
Revised advisory with updates to vCenter Server 6.7.x & 6.5.x.
2022-02-10: VMSA-2021-0028.12
Revised advisory with updates to VMware Cloud Foundation 4.x.
2022-02-14: VMSA-2021-0028.13
Revised advisory with updates to VMware Cloud Foundation 3.x.
E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce
This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com
E-mail: security@vmware.com
PGP key at:
VMware Security Advisories
https://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Copyright 2021 VMware Inc. All rights reserved.