First published: Tue Jan 16 2024(Updated: )
Aria Automation contains a Missing Access Control vulnerability. An authenticated malicious actor may exploit this vulnerability leading to unauthorized access to remote organizations and workflows.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Aria Automation | =8.11.0 | |
VMware Aria Automation | =8.11.1 | |
VMware Aria Automation | =8.11.2 | |
VMware Aria Automation | =8.12.0 | |
VMware Aria Automation | =8.12.1 | |
VMware Aria Automation | =8.12.2 | |
VMware Aria Automation | =8.13.0 | |
VMware Aria Automation | =8.13.1 | |
VMware Aria Automation | =8.14.0 | |
VMware Aria Automation | =8.14.1 | |
VMware Cloud Foundation | =4.0 | |
VMware Cloud Foundation | =5.0 | |
Atlassian Confluence Server/Data Center | =8 | |
Atlassian Confluence Server and Data Server | =8 | |
Atlassian Jira Software Data Center | =8.20.0 | |
Atlassian Jira Software Data Center | =9.4.0 | |
Atlassian Jira Software Data Center | =9.5.0 | |
Atlassian Jira Software Data Center | =9.6.0 | |
VMware Aria Automation | =8.16 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34063 has a high severity rating due to its exploitation potential leading to unauthorized access.
To fix CVE-2023-34063, apply the latest security patches provided by VMware and Atlassian for affected software products.
CVE-2023-34063 affects products such as VMware Aria Automation and certain versions of Atlassian Confluence and Jira Software Data Center.
An authenticated malicious actor can exploit CVE-2023-34063 to gain unauthorized access.
CVE-2023-34063 involves a Missing Access Control vulnerability, allowing unauthorized access to remote organizations and workflows.