Company
Date Published
Author
Tiit Hallas
Word count
1091
Language
American English
Hacker News points
None

Summary

VMware has alerted customers about a proof-of-concept (PoC) exploit for a high-severity authentication bypass vulnerability, CVE-2023-34051, in its Aria Operations for Logs tool, formerly known as vRealize Log Insight. This vulnerability, which has a CVSS score of 8.1, could allow unauthenticated attackers to execute remote code by injecting files into the operating system of affected appliances. The flaw, discovered by James Horseman and the Randori Attack Team from Horizon3.ai, is a patch bypass for previously addressed critical flaws. Attackers can exploit this vulnerability by spoofing an IP address to gain unauthorized access and deploy malicious files, as detailed in a technical deep dive. Detection of such attacks can be achieved by analyzing log files with tools like Dynatrace and DQL, which helps in safeguarding log data by forwarding it to a secure location. To mitigate this threat, VMware recommends updating to the latest version of Aria Operations for Logs and applying the latest patches.