VMware warns customers of exploit available for critical vRealize RCE flaw CVE-2023-20864

1 year ago 100
BOOK THIS SPACE FOR AD
ARTICLE AD

VMware warns customers of the public availability of an exploit code for the RCE vulnerability CVE-2023-20864 affecting vRealize.

VMware warned customers of the availability of an exploit code for the critical RCE vulnerability CVE-2023-20864 in the VMware Aria Operations for Logs analysis tool  (formerly vRealize Log Insight).

VMware Aria Operations for Networks (formerly vRealize Network Insight) is a network monitoring tool that helps organizations build an optimized, highly available, and secure network infrastructure.

In April, the virtualization giant released security updates to address two critical vulnerabilities, tracked as CVE-2023-20864 and CVE-2023-20865, impacting the Aria Operations for Logs product (formerly vRealize Log Insight).

The vulnerability CVE-2023-20864 (CVSSv3 base score of 9.8) is a deserialization issue that can be exploited by an unauthenticated attacker with network access to Aria Operations for Logs to execute arbitrary code as root

Now the company has updated the initial security advisory to confirm the availability of the exploit code for the above issue. The company is urging customers to patch the flaw immediately.

“VMware has confirmed that exploit code for CVE-2023-20864 has been published” reads the security advisory.

In June, the company warned customers that another critical remote code execution vulnerability in Aria Operations for Networks, tracked as CVE-2023-20887, is being actively exploited in the wild.

“VMware has confirmed that exploitation of CVE-2023-20887 has occurred in the wild,” reads the advisory

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

Pierluigi Paganini

(SecurityAffairs – hacking, CVE-2023-20864)




Read Entire Article