ºÚÁÏÉç

Arctic Wolf Security Bulletin
Arctic Wolf Security Bulletin

Critical Authentication Bypass Vulnerability in VMware Aria Operations for Networks: CVE-2023-34039

VMware disclosed a critical authentication bypass vulnerability (CVE-2023-34039) that could result in a threat actor gaining access to the Aria Operations for Networks CLI. Find Arctic Wolf’s recommendations for remediation in our latest security bulletin.
Arctic Wolf Security Bulletin
6 min read

On Tuesday, August 29, 2023, VMware disclosed a critical authentication bypass vulnerability (CVE-2023-34039) in VMware Aria Operations for Networks¨Cformerly known as vRealize Network Insight¨Cthat could result in a threat actor gaining access to the Aria Operations for Networks CLI by bypassing SSH authentication. ?

The vulnerability was responsibly disclosed to VMware and has not been actively exploited in campaigns. Furthermore, we have not identified a public proof of concept (PoC) exploit for CVE-2023-34039. However, threat actors have historically leveraged a VMware Aria Operations for Networks command injection vulnerability () to obtain remote code execution, according to CISA¡¯s Known Exploited Vulnerabilities Catalog. ?

In addition to CVE-2023-34039, VMware disclosed one other vulnerability that impacts the same VMware Aria Operations for Networks version. ?

  • CVE-2023-20890 (CVSS 7.2): Arbitrary File Write Vulnerability?
VMware Aria Operations for Network?
Affected Versions? Fixed Version?
6.x? 6.11 ()?
6.2.0? Build number:??
6.3.0? Build number:??
6.4.0? Build number:??
6.5.1? Build number:??
6.6.0? Build number:??
6.7.0? Build number:??
6.8.0? Build number:??
6.9.0? Build number:??
6.10.0? Build number: ?

?

CVE-2023-34039 Recommendation: Upgrade VMware Aria Operations for Networks to 6.11 or a Fixed Build Number?

Arctic Wolf strongly recommends upgrading VMware Aria Operations for Networks to 6.11 or a fixed build number to prevent potential exploitation. ?

The upgrade package can be found in VMware¡¯s Customer Connect portal here: ?

Please follow your organizations patching and testing guidelines to avoid operational impact.?

References?

Share this post: