VMware on Tuesday introduced program to remediate four security vulnerabilities influencing vRealize Log Perception (aka Aria Functions for Logs) that could expose buyers to distant code execution attacks.
Two of the flaws are critical, carrying a severity ranking of 9.8 out of a highest of 10, the virtualization companies service provider famous in its initially security bulletin for 2023.
Tracked as CVE-2022-31706 and CVE-2022-31704, the directory traversal and damaged access handle issues could be exploited by a risk actor to achieve remote code execution irrespective of the difference in the attack pathway.
“An unauthenticated, destructive actor can inject files into the functioning method of an impacted appliance which can result in distant code execution,” the firm claimed of the two shortcomings.
A third vulnerability relates to a deserialization flaw (CVE-2022-31710, CVSS rating: 7.5) that could be weaponized by an unauthenticated attacker to result in a denial-of-assistance (DoS) situation.
Finally, vRealize Log Perception has also been found inclined to an data disclosure bug (CVE-2022-31711, CVSS rating: 5.3) which could allow obtain to delicate session and application data with out any authentication.
The Zero Day Initiative (ZDI) has been credited for reporting all the flaws. Aside from releasing variation 8.10.2 to handle the issues, VMware has also offered workarounds to mitigate them until the patches can be used.
Whilst there is no indication that the aforementioned vulnerabilities have been exploited in the wild, it really is not unusual for risk actors to goal VMware appliances in their attacks, generating it vital that the fixes are used as soon as possible.
Uncovered this short article attention-grabbing? Observe us on Twitter and LinkedIn to go through much more exceptional content material we put up.
Some parts of this article are sourced from:
thehackernews.com