Through Protection: new VMware bug renders updates useless

Carding 4 Carders

Professional
Messages
2,730
Reaction score
1,517
Points
113
The VMware vulnerability puts your data at risk even after updates.

VMware, which specializes in virtualization services, warned its customers about the existence of a PoC exploit for a recently patched vulnerability in the Aria Operations for Logs product. The authentication bypass vulnerability CVE-2023-34051 (CVSS: 8.1) allows an unauthenticated attacker to execute code remotely.

Specialists from Horizon3.ai and the Randori Attack teams were the first to detect and report this error. Horizon3.ai It also offered a Proof of Concept (PoC) for the flaw, which prompted VMware to review and supplement its notice.

It is noted that CVE-2023-34051 is a workaround (bypass) for a number of critical vulnerabilities that were fixed by VMware in January, and which could expose users to attacks with remote Code Execution (RCE). This means that, despite previously released fixes for vulnerabilities, hackers have found a new way to exploit them through the vulnerability CVE-2023-34051.

In this case, the vulnerability CVE-2023-34051 allows attackers to bypass authentication mechanisms and possibly other security mechanisms in order to remotely execute code on affected systems. This creates a risk for users, as cybercriminals can use this RCE vulnerability to execute malicious code on affected systems, even if previously recommended updates were applied to fix previous flaws.
 
Top