VMSA-2023-0015

vmware logo header

Moderate


VMSA-2023-0015

5.3

2023-07-06

2023-07-06 (Initial Advisory)

CVE-2023-20899

VMware SD-WAN update addresses a bypass authentication vulnerability (CVE-2023-20899)

1. Impacted Products



VMware SD-WAN (Edge)

2. Introduction



An Authentication Bypass Vulnerability affecting VMware SD-WAN was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.

3. VMware SD-WAN Bypass Authentication Vulnerability (CVE-2023-20899)

Description



VMware SD-WAN contains a bypass authentication vulnerability. VMware has evaluated the severity of this issue to be in the moderate severity range with a maximum CVSSv3 base score of 5.3.

Known Attack Vectors



An unauthenticated attacker can download the Diagnostic bundle of the application under VMware SD-WAN Management.

Resolution



To remediate CVE-2023-20899 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below.

Workarounds



None

Additional Documentation



None

Notes



This vulnerability affects Edge devices only and not the SD-WAN management console (VCO)

Acknowledgements



VMware would like to thank Marco Bruinenberg of Accenture for reporting this issue to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware SD-WAN (Edge)
5.2
Any
CVE-2023-20899
N/A
N/A

Unaffected
None
None
VMware SD-WAN (Edge)
5.1.x
Any
CVE-2023-20899
N/A
N/A

Unaffected
None
None
VMware SD-WAN (Edge)
5.0.x
Any
CVE-2023-20899
moderate

None
None
VMware SD-WAN (Edge)
4.5.x
Any
CVE-2023-20899
moderate

None
None

4. References

5. Change Log



2023-07-06 VMSA-2023-0015

Initial security advisory.

6. Contact



E-mail list for product security notifications and announcements:

https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce 

 

This Security Advisory is posted to the following lists:  

security-announce@lists.vmware.com  

bugtraq@securityfocus.com  

fulldisclosure@seclists.org 

 

E-mail: security@vmware.com

PGP key at:

https://kb.vmware.com/kb/1055 

 

VMware Security Advisories

https://www.vmware.com/security/advisories 

 

VMware Security Response Policy

https://www.vmware.com/support/policies/security_response.html 

 

VMware Lifecycle Support Phases

https://www.vmware.com/support/policies/lifecycle.html 

 

VMware Security & Compliance Blog  

https://blogs.vmware.com/security 

 

Twitter

https://twitter.com/VMwareSRC

 

Copyright 2023 VMware Inc. All rights reserved.
 

Read full article (vmware.com)

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Leave a Reply
Previous Post
citrix logo header

Activate a ShareFile employee/client user from “Forgot Password” without re-sending welcome email

Next Post
citrix logo header

Virtual Desktop:Remote PC physical console black screen

Related Posts