VMware has unveiled application updates to proper two security vulnerabilities in Aria Operations for Networks that could be probably exploited to bypass authentication and achieve distant code execution.
The most critical of the flaws is CVE-2023-34039 (CVSS score: 9.8), which relates to a scenario of authentication bypass arising as a result of a deficiency of exceptional cryptographic critical technology.
“A destructive actor with network accessibility to Aria Functions for Networks could bypass SSH authentication to get accessibility to the Aria Operations for Networks CLI,” the business said in an advisory.
ProjectDiscovery researchers Harsh Jaiswal and Rahul Maini have been credited with finding and reporting the issue.
The next weak spot, CVE-2023-20890 (CVSS score: 7.2), is an arbitrary file create vulnerability impacting Aria Operations for Networks that could be abused by an adversary with administrative access to publish documents to arbitrary locations and attain distant code execution.
Credited with reporting the bug is Sina Kheirkhah of Summoning Team, who earlier uncovered a number of flaws in the identical merchandise, which include CVE-2023-20887, which arrived beneath active exploitation in the wild in June 2023.
The vulnerabilities, which have an effect on VMware Aria Operations Networks variations 6.2, 6.3, 6.4, 6.5.1, 6.6, 6.7, 6.8, 6.9, and 6.10, have been resolved in a series of patches unveiled by VMware for each and every of the versions.
The virtualization companies provider said that variation 6.11. will come with fixes for the two flaws.
With security issues in VMware turning into a lucrative focus on for threat actors in the past, it’s very important that people transfer quickly to update to the most up-to-date variation to safeguard towards likely threats.
Discovered this write-up attention-grabbing? Observe us on Twitter and LinkedIn to go through far more special information we put up.
Some parts of this report are sourced from: