VMSA-2024-0001

vmware logo header

Critical


VMSA-2024-0001

9.9

2024-01-16

2024-01-16 (Initial Advisory)

CVE-2023-34063

VMware Aria Automation (formerly vRealize Automation) updates address a Missing Access Control vulnerability (CVE-2023-34063)

1. Impacted Products



  • VMware Aria Automation (formerly vRealize Automation)
  • VMware Cloud Foundation (Aria Automation)

2. Introduction



A Missing Access Control vulnerability in Aria Automation was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products.

3. Aria Automation Missing Access Control Vulnerability (CVE-2023-34063)

Description



Aria Automation contains a Missing Access Control vulnerability. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.9.

Known Attack Vectors



An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows.

Resolution



To remediate CVE-2023-34063 apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.

Workarounds



None.  

Additional Documentation



A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2024-0001-qna

Notes



None.

Acknowledgements



VMware would like to thank Commonwealth Scientific and Industrial Research Organisation’s (CSIRO) Scientific Computing Platforms team for reporting this issue to us.

Response Matrix

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Aria Automation
8.16
Any
CVE-2023-34063
N/A
N/A

Unaffected
N/A
VMware Aria Automation
8.14.x
Any
CVE-2023-34063
critical

N/A
VMware Aria Automation
8.13.x
Any
CVE-2023-34063
critical

N/A
VMware Aria Automation
8.12.x
Any
CVE-2023-34063
critical

N/A
VMware Aria Automation
8.11.x
Any
CVE-2023-34063
critical

N/A
VMware Cloud Foundation (Aria Automation)
5.x, 4.x
Any
CVE-2023-34063
critical

N/A

4. References

5. Change Log



2024-01-16 VMSA-2024-0001

Initial security advisory.  

6. Contact



E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055 

VMware Security Advisories
https://www.vmware.com/security/advisories 

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html 

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html 

VMware Security & Compliance Blog  
https://blogs.vmware.com/security 

Twitter
https://twitter.com/VMwareSRC

 

Copyright 2024 Broadcom. All rights reserved.
 

Read full article (vmware.com)

All content and images belong to their respected owners, this article is curated for informational purposes only.

Total
0
Shares
Leave a Reply
Previous Post
citrix logo header

Citrix Provisioning Services Antivirus Best Practices

Next Post
citrix logo header

Will the “World Wide Web Publishing Service” be stopped during Storefront propogation

Related Posts