First published: Fri May 12 2023(Updated: )
VMware Aria Operations contains a deserialization vulnerability. A malicious actor with administrative privileges can execute arbitrary commands and disrupt the system.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Cloud Foundation | >=4.0<=4.5 | |
Vmware Vrealize Operations | =8.6.0 | |
Vmware Vrealize Operations | =8.6.0-hotfix1 | |
Vmware Vrealize Operations | =8.6.0-hotfix2 | |
Vmware Vrealize Operations | =8.6.0-hotfix4 | |
Vmware Vrealize Operations | =8.6.0-hotfix5 | |
Vmware Vrealize Operations | =8.6.0-hotfix6 | |
Vmware Vrealize Operations | =8.6.0-hotfix8 | |
Vmware Vrealize Operations | =8.6.0-hotfix9 | |
Vmware Vrealize Operations | =8.10.0 | |
Vmware Vrealize Operations | =8.10.0-hotfix1 | |
Vmware Vrealize Operations | =8.10.0-hotfix2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20878 is a deserialization vulnerability in VMware Aria Operations that allows a malicious actor with administrative privileges to execute arbitrary commands and disrupt the system.
CVE-2023-20878 affects VMware Cloud Foundation versions 4.0 to 4.5, Vmware Vrealize Operations version 8.6.0, and Vmware Vrealize Operations versions 8.6.0-hotfix1 to 8.10.0-hotfix2.
CVE-2023-20878 has a severity rating of 7.2 (High).
A malicious actor with administrative privileges can exploit CVE-2023-20878 by executing arbitrary commands.
Yes, VMware has released a security advisory with recommended patches and mitigations for CVE-2023-20878. Please refer to the official VMware security advisory for more information.