VMSA-2023-0012

vmware logo header

Critical


VMSA-2023-0012

8.8 – 9.8

2023-06-07

2023-06-07 (Initial Advisory)

CVE-2023-20887, CVE-2023-20888, CVE-2023-20889

VMware Aria Operations for Networks updates address multiple vulnerabilities. (CVE-2023-20887, CVE-2023-20888, CVE-2023-20889)

1. Impacted Products



  • Aria Operations for Networks (Formerly vRealize Network Insight)

2. Introduction



Multiple vulnerabilities in Aria Operations for Networks were privately reported to VMware. Patches are available to remediate these vulnerabilities in affected VMware products.

3a. Aria Operations for Networks Command Injection Vulnerability (CVE-2023-20887)

Description



Aria Operations for Networks contains a command injection vulnerability. VMware has evaluated the severity of this issue to be in the critical severity range with a maximum CVSSv3 base score of 9.8.

Known Attack Vectors



A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in remote code execution.

Resolution



To remediate CVE-2023-20887 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below.

Workarounds



None.

Additional Documentation



None.

Notes



None.

Acknowledgements



VMware would like to thank Anonymous working with Trend Micro Zero Day Initiative for reporting this issue to us.

3b. Aria Operations for Networks Authenticated Deserialization Vulnerability (CVE-2023-20888)

Description



Aria Operations for Networks contains an authenticated deserialization vulnerability. VMware has evaluated the severity of this issue to be in the critical severity range with a maximum CVSSv3 base score of 9.1.

Known Attack Vectors



A malicious actor with network access to VMware Aria Operations for Networks and valid ‘member’ role credentials may be able to perform a deserialization attack resulting in remote code execution.

Resolution



To remediate CVE-2023-20888 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below.

Workarounds



None.

Additional Documentation



None.

Notes



None.

Acknowledgements



VMware would like to thank Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative for reporting this issue to us.

3c. Aria Operations for Networks Information Disclosure Vulnerability (CVE-2023-20889)

Description



Aria Operations for Networks contains an information disclosure vulnerability. VMware has evaluated the severity of this issue to be in the important severity range with a maximum CVSSv3 base score of 8.8.

Known Attack Vectors



A malicious actor with network access to VMware Aria Operations for Networks may be able to perform a command injection attack resulting in information disclosure.

Resolution



To remediate CVE-2023-20889 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below.

Workarounds



None.

Additional Documentation



None.

Notes



None.

Acknowledgements



VMware would like to thank Sina Kheirkhah (@SinSinology) of Summoning Team (@SummoningTeam) working with Trend Micro Zero Day Initiative for reporting this issue to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Aria Operations Networks
6.x
Any
CVE-2023-20887, CVE-2023-20888, CVE-2023-20889
critical

None
N/A

4. References

5. Change Log



2023-06-07 VMSA-2023-0012

Initial security advisory.

6. Contact

Read full article (vmware.com)

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Leave a Reply
Previous Post
citrix logo header

Anti Virus scan for Citrix managed storage zone

Next Post
citrix logo header

Unable to sign in to MCS provisioned machine via RDP after the first reboot of VDA upgrading.

Related Posts