First published: Fri May 12 2023(Updated: )
VMware Aria Operations contains a privilege escalation vulnerability. An authenticated malicious user with ReadOnly privileges can perform code execution leading to privilege escalation.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=4.0<=4.5 | |
Vmware Vrealize Operations | =8.6.0 | |
Vmware Vrealize Operations | =8.6.0-hotfix1 | |
Vmware Vrealize Operations | =8.6.0-hotfix2 | |
Vmware Vrealize Operations | =8.6.0-hotfix4 | |
Vmware Vrealize Operations | =8.6.0-hotfix5 | |
Vmware Vrealize Operations | =8.6.0-hotfix6 | |
Vmware Vrealize Operations | =8.6.0-hotfix8 | |
Vmware Vrealize Operations | =8.6.0-hotfix9 | |
Vmware Vrealize Operations | =8.10.0 | |
Vmware Vrealize Operations | =8.10.0-hotfix1 | |
Vmware Vrealize Operations | =8.10.0-hotfix2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20877 is a privilege escalation vulnerability in VMware Aria Operations.
VMware Cloud Foundation versions 4.0 to 4.5, and VMware vRealize Operations versions 8.6.0 to 8.10.0-hotfix2 are affected by CVE-2023-20877.
CVE-2023-20877 has a severity rating of 8.8 (high).
An authenticated malicious user with ReadOnly privileges can exploit CVE-2023-20877 to perform code execution and achieve privilege escalation.
Yes, VMware has released a security advisory (VMSA-2023-0009) that provides information on necessary patches and mitigations for CVE-2023-20877.