VMSA-2023-0023

vmware logo header

Critical


VMSA-2023-0023

4.3-9.8

2023-10-25

2023-10-25 (Initial Advisory)

CVE-2023-34048, CVE-2023-34056

VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities (CVE-2023-34048, CVE-2023-34056)

1. Impacted Products



  • VMware vCenter Server
  • VMware Cloud Foundation

2. Introduction



An out-of-bounds write (CVE-2023-34048) and a partial information disclosure (CVE-2023-34056) in vCenter Server were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products.

3a. VMware vCenter Server Out-of-Bounds Write Vulnerability (CVE-2023-34048)

Description



vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.

Known Attack Vectors



A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.

Resolution



To remediate CVE-2023-34048 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds



In-product workarounds were investigated, but were determined to not be viable.

Additional Documentation



A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0023-qna

Notes



  • While VMware does not mention end-of-life products in VMware Security Advisories, due to the critical severity of this vulnerability and lack of workaround VMware has made a patch generally available for vCenter Server 6.7U3, 6.5U3, and VCF 3.x. For the same reasons, VMware has made additional patches available for vCenter Server 8.0U1.
  • Async vCenter Server patches for VCF 5.x and 4.x deployments have been made available. Please see KB88287 for more information.

Acknowledgements



VMware would like to thank Grigory Dorodnov of Trend Micro Zero Day Initiative for reporting this issue to us.

3b. VMware vCenter Server Partial Information Disclosure Vulnerability (CVE-2023-34056)

Description



vCenter Server contains a partial information disclosure vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.3.

Known Attack Vectors



A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data.

Resolution



To remediate CVE-2023-34056 apply the updates listed in the ‘Fixed Version’ column of the ‘Response Matrix’ below to affected deployments.

Workarounds



None.

Additional Documentation



None.

Acknowledgements



VMware would like to thank Oleg Moshkov of Deiteriy Lab OÜ for reporting this issue to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware vCenter Server
8.0
Any
CVE-2023-34048, CVE-2023-34056
9.8, 4.3
critical

None
VMware vCenter Server
8.0
Any
CVE-2023-34048
9.8
critical

None
VMware vCenter Server
7.0
Any
CVE-2023-34048, CVE-2023-34056
9.8, 4.3
critical

None
VMware Cloud Foundation (VMware vCenter Server)
5.x, 4.x
Any
CVE-2023-34048, CVE-2023-34056
9.8, 4.3
critical

None

4. References

5. Change Log



2023-10-25 VMSA-2023-0023
Initial security advisory.

6. Contact



E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055 

VMware Security Advisories
https://www.vmware.com/security/advisories 

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html 

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html 

VMware Security & Compliance Blog  
https://blogs.vmware.com/security 

Twitter
https://twitter.com/VMwareSRC

Copyright 2023 VMware Inc. All rights reserved.
 

Read full article (vmware.com)

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Leave a Reply
Previous Post
citrix logo header

Shutdown scripts are removed from local policy after target software installation completes

Next Post
citrix logo header

How to change your device for Multifactor Authentication for citrix.com and cloud.com

Related Posts