Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit Gruppo ECP Advpress Automationtoday AI DevwWrld CyberDSA Chatbot Summit Cyber Revolution Summit CYSEC Global Cyber Security & Cloud Expo World Series Digital Identity & Authentication Summit Asian Integrated Resort Expo Middle East Low Code No Code Summit TimeAI Summit

VMware addresses critical vulnerabilities in Aria Operations for Networks

The tech giant quickly responds to three serious vulnerabilities, protecting businesses from possible remote code execution attacks

This pill is also available in Italian language

VMware, the virtualization technology giant, released urgent fixes on Wednesday to address security flaws in its Aria Operations for Networks product. These vulnerabilities put enterprises at risk by exposing them to possible remote code execution attacks.

Three critical vulnerabilities in network and application monitoring

In an advisory, VMware has documented three critical vulnerabilities affecting its network and application monitoring tool. The company specifically highlighted a command injection issue (CVE-2023-20887) with a CVSSv3 base score of 9.8 out of 10. An attacker with network access could exploit this vulnerability in VMware Aria Operations for Networks to execute a command injection attack, leading to remote code execution.

Use of Aria Operations for Networks in companies

VMware's Aria Operations for Networks, formerly known as vRealize Network Insight, is used by enterprises to monitor, discover and analyze networks and applications in order to build a secure network infrastructure across various clouds.

Two more vulnerabilities documented by VMware

VMware has also documented an authenticated deserialization vulnerability (CVE-2023-20888) that allows a malicious actor with network access and valid "member" role credentials to launch a deserialization attack that leads to remote code execution. This bug has a CVSSv3 base score of 9.1 out of 10. The company also fixed an information disclosure flaw (CVE-2023-20889) that allows an attacker with access to the VMware Aria Operations for Networks network to execute command injection attacks leading to the disclosure of sensitive data.

Follow us on Threads for more pills like this

06/07/2023 15:13

Marco Verro

Complementary pills

VMware mitigates security threats with critical updates for vCenter ServerThe virtualization company addresses five memory corruption vulnerabilities that could allow remote code execution

Last pills

Cloudflare repels the most powerful DDoS attack ever recordedAdvanced defense and global collaboration to tackle new challenges of DDoS attacks

Silent threats: the zero-click flaw that compromises RDP serversHidden risks in remote work: how to protect RDP servers from invisible attacks

Discovery of vulnerability in Secure Boot threatens device securityFlaw in the Secure Boot system requires urgent updates to prevent invisible intrusions

North korean cyberattacks and laptop farming: threats to smart workingAdapting to new digital threats of remote work to protect vital data and infrastructures

Don’t miss the most important news
Enable notifications to stay always updated