VMware this week announced the availability of patches for an authentication bypass vulnerability in VMware Carbon Black App Control (AppC) running on Windows machines.
Carbon Black App Control is designed to improve the security of servers and other critical systems by locking them down to prevent unauthorized tampering.
The newly addressed security hole, the company says, could be exploited by an attacker to gain unauthenticated administrative access to the application.
However, even if the attacker doesn’t need valid credentials for the target application, they would still have to first gain network access to the VMware Carbon Black App Control management server for the attack to succeed, VMware explains in an advisory.
Tracked as CVE-2021-21998, the vulnerability is considered critical, with a CVSS score of 9.4.
VMware notes that there are no workarounds to mitigate this vulnerability. However, software updates have been released to address it and users are advised to apply those as soon as possible.
Fixed releases include VMware Carbon Black App Control (AppC) 8.6.2 and 8.5.8, along with a hotfix already available for the 8.1.x and 8.0.x versions of AppC. Users need to log into the Carbon Black UEX Portal to download the necessary files.
VMware says the vulnerability was reported privately.
Related: VMware Patches Privilege Escalation Vulnerability in Tools for Windows
Related: VMware Urges Customers to Immediately Patch Critical vSphere Vulnerability
Related: VMware Patches Critical Flaw Reported by Sanctioned Russian Security Firm
Related: VMware Patches Critical Flaw in Carbon Black Cloud Workload

More from Ionut Arghire
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Atlassian Warns of Critical Jira Service Management Vulnerability
- Exploitation of Oracle E-Business Suite Vulnerability Starts After PoC Publication
- Google Shells Out $600,000 for OSS-Fuzz Project Integrations
- F5 BIG-IP Vulnerability Can Lead to DoS, Code Execution
- Flaw in Cisco Industrial Appliances Allows Malicious Code to Persist Across Reboots
- HeadCrab Botnet Ensnares 1,200 Redis Servers for Cryptomining
- Malicious NPM, PyPI Packages Stealing User Information
Latest News
- Fraudulent “CryptoRom” Apps Slip Through Apple and Google App Store Review Process
- US Downs Chinese Balloon Off Carolina Coast
- Microsoft: Iran Unit Behind Charlie Hebdo Hack-and-Leak Op
- Feds Say Cyberattack Caused Suicide Helpline’s Outage
- Big China Spy Balloon Moving East Over US, Pentagon Says
- Former Ubiquiti Employee Who Posed as Hacker Pleads Guilty
- Cyber Insights 2023: Venture Capital
- Atlassian Warns of Critical Jira Service Management Vulnerability
