First published: Fri Oct 20 2023(Updated: )
VMware Aria Operations for Logs contains an authentication bypass vulnerability. An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Aria Operations for Logs | =4.0 | |
VMware Aria Operations for Logs | =5.0 | |
VMware Aria Operations for Logs | =8.6 | |
VMware Aria Operations for Logs | =8.8 | |
VMware Aria Operations for Logs | =8.10 | |
VMware Aria Operations for Logs | =8.10.2 | |
VMware Aria Operations for Logs | =8.12 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this issue is CVE-2023-34051.
The severity of CVE-2023-34051 is critical with a CVSS score of 9.8.
The versions 4.0, 5.0, 8.6, 8.8, 8.10, 8.10.2, and 8.12 of VMware Aria Operations for Logs are affected by CVE-2023-34051.
CVE-2023-34051 allows an unauthenticated attacker to inject files into the operating system of an impacted appliance, which can result in remote code execution.
You can find more information about CVE-2023-34051 at the following link: [link](https://www.vmware.com/security/advisories/VMSA-2023-0021.html)