First published: Wed Jul 26 2023(Updated: )
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Isolation Segment | >=2.11.0<2.11.35 | |
VMware Isolation Segment | >=2.13.0<2.13.20 | |
VMware Isolation Segment | >=3.0.0<3.0.13 | |
VMware Isolation Segment | >=4.0.0<4.0.4 | |
VMware Tanzu Application Service | >=2.11.0<2.11.42 | |
VMware Tanzu Application Service | >=3.0.0<3.0.14 | |
VMware Tanzu Application Service | >=2.13.0<2.13.24 | |
VMware Tanzu Application Service | >=4.0.0<4.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-20891 is an information disclosure vulnerability in VMware Tanzu Application Service for VMs and Isolation Segment.
CVE-2023-20891 has a severity rating of 6.5 (Medium).
CVE-2023-20891 allows a malicious non-admin user with access to the platform system audit logs to access hex encoded CF API credentials.
To fix CVE-2023-20891, upgrade to a version of VMware Tanzu Application Service for VMs or Isolation Segment that is not affected by the vulnerability.
More information about CVE-2023-20891 can be found in the VMWare security advisory VMSA-2023-0016.