• Menu
  • Skip to main content
  • Skip to primary sidebar

All Tech News

Latest Technology News

Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks

You are here: Home / Cyber Security News / Critical Vulnerability Alert: VMware Aria Operations Networks at Risk from Remote Attacks

VMware has launched software updates to suitable two security vulnerabilities in Aria Operations for Networks that could be potentially exploited to bypass authentication and gain distant code execution.

The most significant of the flaws is CVE-2023-34039 (CVSS rating: 9.8), which relates to a situation of authentication bypass arising as a final result of a deficiency of one of a kind cryptographic important era.

“A destructive actor with network accessibility to Aria Functions for Networks could bypass SSH authentication to acquire entry to the Aria Functions for Networks CLI,” the corporation mentioned in an advisory.

ProjectDiscovery scientists Harsh Jaiswal and Rahul Maini have been credited with discovering and reporting the issue.

The 2nd weak point, CVE-2023-20890 (CVSS rating: 7.2), is an arbitrary file publish vulnerability impacting Aria Functions for Networks that could be abused by an adversary with administrative entry to produce information to arbitrary locations and obtain distant code execution.

Credited with reporting the bug is Sina Kheirkhah of Summoning Team, who formerly uncovered numerous flaws in the exact product or service, like CVE-2023-20887, which arrived beneath active exploitation in the wild in June 2023.

The vulnerabilities, which have an effect on VMware Aria Operations Networks variations 6.2, 6.3, 6.4, 6.5.1, 6.6, 6.7, 6.8, 6.9, and 6.10, have been dealt with in a series of patches released by VMware for just about every of the versions.

The virtualization expert services service provider said that version 6.11. comes with fixes for the two flaws.

With security issues in VMware turning out to be a beneficial focus on for menace actors in the earlier, it is really critical that people move rapidly to update to the most recent edition to safeguard from prospective threats.

Found this write-up exciting? Observe us on Twitter  and LinkedIn to browse more distinctive material we submit.

Some parts of this article are sourced from:
thehackernews.com

Previous Post: « FBI Dismantles QakBot Malware, Frees 700,000 Computers, Seizes $8.6 Million
Next Post: Alert: Juniper Firewalls, Openfire, and Apache RocketMQ Under Attack from New Exploits »

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Recent Posts

  • The Unusual Suspect: Git Repos
  • New PHP-Based Interlock RAT Variant Uses FileFix Delivery Mechanism to Target Multiple Industries
  • ⚡ Weekly Recap: Scattered Spider Arrests, Car Exploits, macOS Malware, Fortinet RCE and More
  • CBI Shuts Down £390K U.K. Tech Support Scam, Arrests Key Operatives in Noida Call Center
  • eSIM Vulnerability in Kigen’s eUICC Cards Exposes Billions of IoT Devices to Malicious Attacks

Copyright © 2025 · AllTech.News, All Rights Reserved.