<?xml version="1.0" encoding="UTF-8"?>        <rss version="2.0"
             xmlns:atom="http://www.w3.org/2005/Atom"
             xmlns:dc="http://purl.org/dc/elements/1.1/"
             xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
             xmlns:admin="http://webns.net/mvcb/"
             xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#"
             xmlns:content="http://purl.org/rss/1.0/modules/content/">
        <channel>
            <title>
									High-Severity SQL Injection Vulnerability in VMware Avi Load Balancer - Cybersecurity Forum				            </title>
            <link>https://www.virtualizationhowto.com/community/cybersecurity-forum/high-severity-sql-injection-vulnerability-in-vmware-avi-load-balancer/</link>
            <description>Virtualization Howto Discussion Board</description>
            <language>en-US</language>
            <lastBuildDate>Sat, 11 Apr 2026 10:57:52 +0000</lastBuildDate>
            <generator>wpForo</generator>
            <ttl>60</ttl>
							                    <item>
                        <title>High-Severity SQL Injection Vulnerability in VMware Avi Load Balancer</title>
                        <link>https://www.virtualizationhowto.com/community/cybersecurity-forum/high-severity-sql-injection-vulnerability-in-vmware-avi-load-balancer/#post-1152</link>
                        <pubDate>Wed, 29 Jan 2025 14:07:05 +0000</pubDate>
                        <description><![CDATA[If you are running the Broadcom/VMware Avi Load Balancer, which is commonly used with the VMware Tanzu solution for Kubernetes. As you can see below, you can select the Avi load balancer whe...]]></description>
                        <content:encoded><![CDATA[<p>If you are running the Broadcom/VMware Avi Load Balancer, which is commonly used with the VMware Tanzu solution for Kubernetes. As you can see below, you can select the Avi load balancer when enabling VMware Tanzu workload cluster in VMware vSphere:</p>
496
<p>You need to take note of a serious vulnerability tracked by the CVE-2025-22217. The CVSS score is 8.6. It is described as:</p>
<ul>
<li>Unauthenticated blind SQL injection</li>
</ul>
<p>What can an attacker do? </p>
<ul>
<li>An attacker with network access can use a specially crafted SQL query to gain database access to your AVI Load Balancer</li>
</ul>
<p>You can read more specifics of the attack here directly from the Broadcom security advisory: <a href="https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25346">Support Content Notification.</a></p>
<p>What do users need to do to remediate the SQL injection vulnerability? Apply the patches listed in the below response matrix. This information comes directly from the Broadcom security advisory page.</p>
<p><strong>Response Matrix:</strong></p>
<table border="1">
<tbody>
<tr>
<td><strong>Product</strong></td>
<td><strong>Version</strong></td>
<td><strong>Running On</strong></td>
<td><strong>CVE</strong></td>
<td><strong>CVSSv3</strong></td>
<td><strong>Severity</strong></td>
<td><strong>Fixed Version</strong></td>
<td><strong>Workarounds</strong></td>
<td><strong>Additional Documents</strong></td>
</tr>
<tr>
<td><span>VMware Avi Load Balancer</span></td>
<td><span>30.1.1</span></td>
<td><span>Any</span></td>
<td><span>CVE-2025-22217</span></td>
<td><span>8.6</span></td>
<td><span>Important</span></td>
<td><a href="https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-1/vmware-avi-load-balancer-release-notes/release-notes-30-1-2.html" target="_blank" rel="noopener"><span>30.1.2-2p2 </span></a></td>
<td><span>None</span></td>
<td><span>None</span></td>
</tr>
<tr>
<td><span>VMware Avi Load Balancer</span></td>
<td><span>30.1.2</span></td>
<td><span>Any</span></td>
<td><span>CVE-2025-22217</span></td>
<td><span>8.6</span></td>
<td><span>Important</span></td>
<td><a href="https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-1/vmware-avi-load-balancer-release-notes/release-notes-30-1-2.html" target="_blank" rel="noopener"><span>30.1.2-2p2 </span></a></td>
<td><span>None</span></td>
<td><span>None</span></td>
</tr>
<tr>
<td><span>VMware Avi Load Balancer</span></td>
<td><span>30.2.1</span></td>
<td><span>Any</span></td>
<td><span>CVE-2025-22217</span></td>
<td><span>8.6</span></td>
<td><span>Important</span></td>
<td><a href="https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-2/vmware-avi-load-balancer-release-notes/release-notes-for-avi-load-balancer-version-30-2-1.html" target="_blank" rel="noopener"><span>30.2.1-2p5 </span></a></td>
<td><span>None</span></td>
<td><span>None</span></td>
</tr>
<tr>
<td><span>VMware Avi Load Balancer</span></td>
<td><span>30.2.2</span></td>
<td><span>Any</span></td>
<td><span>CVE-2025-22217</span></td>
<td><span>8.6</span></td>
<td><span>Important</span></td>
<td><a href="https://techdocs.broadcom.com/us/en/vmware-security-load-balancing/avi-load-balancer/avi-load-balancer/30-2/vmware-avi-load-balancer-release-notes/release-notes-for-avi-load-balancer-version-30-2-2.html" target="_blank" rel="noopener"><span>30.2.2-2p2 </span></a></td>
<td><span>None</span></td>
<td><span>None</span></td>
</tr>
</tbody>
</table>
<h2> </h2>]]></content:encoded>
						                            <category domain="https://www.virtualizationhowto.com/community/cybersecurity-forum/">Cybersecurity Forum</category>                        <dc:creator>Brandon Lee</dc:creator>
                        <guid isPermaLink="true">https://www.virtualizationhowto.com/community/cybersecurity-forum/high-severity-sql-injection-vulnerability-in-vmware-avi-load-balancer/#post-1152</guid>
                    </item>
							        </channel>
        </rss>
		