Broadcom addressed the following vulnerabilities in VMware Aria Operations and Aria Operations for Logs:
The above vulnerabilities impact versions 8.x of VMware Aria Operations and VMware Cloud Foundation 5.x, 4.x. VMware Aria Operations Version 8.18.3 addressed the issues.
Security researchers from Michelin CERT and Abicom, including Maxime Escourbiac, Yassine Bengana, and Quentin Ebel, detected and reported the vulnerabilities.
Broadcom did not report any attacks exploiting one of the issues in the wild.
In October 2024, VMware warned customers of the availability of a proof-of-concept (PoC) exploit code for another authentication bypass vulnerability, tracked as CVE-2023-34051, in VMware Aria Operations for Logs (formerly known as vRealize Log Insight).
The vulnerability CVE-2023-34051 (CVSS score 8.1) is an authentication bypass vulnerability in VMware Aria Operations for Logs.
“An unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.” reads the advisory published by the virtualization giant.
“Updated VMSA to note that VMware has confirmed that exploit code for CVE-2023-34051 has been published”.
The vulnerability was discovered by cybersecurity firm Horizon3, which published a technical analysis of the flaw.
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
(SecurityAffairs – hacking, VMware)