{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2023-060.pdf"
    },
    "title": "Critical Vulnerability in VMware Aria Operations for Networks ",
    "serial_number": "2023-060",
    "publish_date": "31-08-2023 14:26:11",
    "description": "On August 29, VMware released security updates to patch one critical (CVE-2023-34039) and one high-severity (CVE-2023-20890) vulnerability in Aria Operations for Networks, its enterprise network monitoring tool. The flaws were responsibly reported to the vendor and as of the time of writing, there is no evidence of exploitation in the wild.<br>\nCERT-EU urges users to promptly apply the provided fixes. <br>\n",
    "url_title": "2023-060",
    "content_markdown": "---\ntitle: 'Critical Vulnerability in\u00a0VMware Aria\u00a0Operations\u00a0for\u00a0Networks ' \nversion: '1.0'\nnumber: '2023-060'\noriginal_date: 'August 29, 2023'\ndate: 'August 31, 2023'\n---\n\n_History:_\n\n* _31/08/2023 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn August 29, VMware released security updates to patch one critical (CVE-2023-34039) and one high-severity (CVE-2023-20890) vulnerability in Aria Operations for Networks, its enterprise network monitoring tool [1]. The flaws were responsibly reported to the vendor and as of the time of writing, there is no evidence of exploitation in the wild.\n\nCERT-EU urges users to promptly apply the provided fixes [2]. \n\n# Technical Details\n\n## Critical Vulnerability (CVE-2023-34039)\n\nAria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. This vulnerability may allow an attacker with network access to Aria Operations for Networks, to bypass SSH authentication and gain unauthorised access to the Aria Operations for Networks command-line interface (CLI).\n\n## High-Severity Vulnerability (CVE-2023-20898)\n\nAria Operations for Networks contains an arbitrary file write vulnerability. An authenticated malicious actor with administrative access to VMware Aria Operations for Networks could exploit this vulnerability to write files to arbitrary locations, potentially resulting in remote code execution.\n\n# Affected Products\n\nThe versions of the product starting with **6.2** and prior to **6.11** are impacted.\n\n# Recommendations\n\nThe vulnerabilities are fixed in versions **6.11** [2].\n\n## Workarounds\n\nThere is no workaround available for these vulnerabilities.\n\n# References\n\n[1] <https://www.vmware.com/security/advisories/VMSA-2023-0018.html>\n\n[2] <https://kb.vmware.com/s/article/94152>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>31/08/2023 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On August 29, VMware released security updates to patch one critical (CVE-2023-34039) and one high-severity (CVE-2023-20890) vulnerability in Aria Operations for Networks, its enterprise network monitoring tool [1]. The flaws were responsibly reported to the vendor and as of the time of writing, there is no evidence of exploitation in the wild.</p><p>CERT-EU urges users to promptly apply the provided fixes [2]. </p><h2 id=\"technical-details\">Technical Details</h2><h3 id=\"critical-vulnerability-cve-2023-34039\">Critical Vulnerability (CVE-2023-34039)</h3><p>Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. This vulnerability may allow an attacker with network access to Aria Operations for Networks, to bypass SSH authentication and gain unauthorised access to the Aria Operations for Networks command-line interface (CLI).</p><h3 id=\"high-severity-vulnerability-cve-2023-20898\">High-Severity Vulnerability (CVE-2023-20898)</h3><p>Aria Operations for Networks contains an arbitrary file write vulnerability. An authenticated malicious actor with administrative access to VMware Aria Operations for Networks could exploit this vulnerability to write files to arbitrary locations, potentially resulting in remote code execution.</p><h2 id=\"affected-products\">Affected Products</h2><p>The versions of the product starting with <strong>6.2</strong> and prior to <strong>6.11</strong> are impacted.</p><h2 id=\"recommendations\">Recommendations</h2><p>The vulnerabilities are fixed in versions <strong>6.11</strong> [2].</p><h3 id=\"workarounds\">Workarounds</h3><p>There is no workaround available for these vulnerabilities.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.vmware.com/security/advisories/VMSA-2023-0018.html\">https://www.vmware.com/security/advisories/VMSA-2023-0018.html</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.vmware.com/s/article/94152\">https://kb.vmware.com/s/article/94152</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}