Cisco and VMware have launched safety updates to handle vital safety flaws of their merchandise that could possibly be exploited by malicious actors to execute arbitrary code on affected programs.
Essentially the most extreme of the vulnerabilities is a command injection flaw in Cisco Industrial Network Director (CVE-2023-20036, CVSS rating: 9.9), which resides within the internet UI part and arises because of improper enter validation when uploading a Device Pack.
„A profitable exploit might enable the attacker to execute arbitrary instructions as NT AUTHORITYSYSTEM on the underlying working system of an affected gadget,“ Cisco said in an advisory launched on April 19, 2023.
The networking gear main additionally resolved a medium-severity file permissions vulnerability in the identical product (CVE-2023-20039, CVSS rating: 5.5) that an authenticated, native attacker might abuse to view delicate data.
Patches have been made accessible in version 1.11.3, with Cisco crediting an unnamed „exterior“ researcher for reporting the 2 points.
Additionally fastened by Cisco is one other vital flaw within the exterior authentication mechanism of the Modeling Labs community simulation platform. Tracked as CVE-2023-20154 (CVSS rating: 9.1), the vulnerability might allow an unauthenticated, distant attacker to entry the online interface with administrative privileges.
„To use this vulnerability, the attacker would wish legitimate consumer credentials which might be saved on the related exterior authentication server,“ the corporate noted.
„If the LDAP server is configured in such a manner that it’ll reply to go looking queries with a non-empty array of matching entries (replies that comprise search consequence reference entries), this authentication bypass vulnerability could be exploited.“
Whereas there are workarounds that plug the safety gap, Cisco cautions prospects to check the effectiveness of such remediations in their very own environments earlier than administering them. The shortcoming has been patched with the release of version 2.5.1.
VMware ships updates for Aria Operations for Logs
VMware, in an advisory launched on April 20, 2023, warned of a vital deserialization flaw impacting a number of variations of Aria Operations for Logs (CVE-2023-20864, CVSS rating: 9.8).
Defend with Deception: Advancing Zero Belief Safety
Uncover how Deception can detect superior threats, cease lateral motion, and improve your Zero Belief technique. Be a part of our insightful webinar!
„An unauthenticated, malicious actor with community entry to VMware Aria Operations for Logs might be able to execute arbitrary code as root,“ the virtualization providers supplier said.
VMware Aria Operations for Logs 8.12 fixes this vulnerability together with a high-severity command injection flaw (CVE-2023-20865, CVSS rating: 7.2) that would enable an attacker with admin privileges to run arbitrary instructions as root.
„CVE-2023-20864 is a vital situation and ought to be patched instantly,“ the corporate said. „It must be highlighted that solely model 8.10.2 is impacted by this vulnerability.“
The alert comes virtually three months after VMware plugged two vital points in the identical product (CVE-2022-31704 and CVE-2022-31706, CVSS scores: 9.8) that would end in distant code execution.
With Cisco and VMware home equipment turning out to be profitable targets for risk actors, it is advisable that customers transfer shortly to use the updates to mitigate potential threats.