Cisco and VMware Release Security Updates to Patch Critical Flaws in their Products

April 21, 2023Rabbi LakshmananSoftware Update / Network Security

Cisco and VMware

Cisco and VMware have released security updates to address a critical security flaw in their products that could be exploited by malicious actors to execute arbitrary code on affected systems. bottom.

The most severe vulnerability is a command injection flaw (CVE-2023-20036, CVSS score: 9.9) in Cisco Industrial Network Director. This exists in the Web UI component and is a result of improper input validation when uploading device packs. .

In an advisory released on April 19, 2023, Cisco stated, “A successful exploit could allow an attacker to execute arbitrary commands as NT AUTHORITY\SYSTEM on the underlying operating system of the affected device. may become.

Network Appliance Major, the same product (CVE-2023-20039, CVSS score: 5.5) has a moderate severity file permissions vulnerability that can be exploited by an authenticated, local attacker to view sensitive information Gender is resolved.

A patch is now available for version 1.11.3. Cisco credits an unnamed “external” researcher for reporting two issues.

Cisco has also fixed another critical flaw in the external authentication mechanism of the Modeling Lab’s network simulation platform. This vulnerability, tracked as CVE-2023-20154 (CVSS score: 9.1), could allow an unauthenticated, remote attacker to access her web interface with administrative privileges.

“To exploit this vulnerability, an attacker would need valid user credentials stored on an associated external authentication server,” the company said.

“This authentication bypass vulnerability could be exploited if the LDAP server is configured to respond to a search query with a non-empty array of matching entries (responses containing search result referral entries). .”

Workarounds exist to close the security hole, but Cisco warns customers to test the effectiveness of such remediation in their own environment before managing it. This shortcoming has been fixed with the release of version 2.5.1.

VMware ships update to Aria Operations for Logs

In an advisory released on April 20, 2023, VMware warned of a critical deserialization flaw affecting multiple versions of Aria Operations for Logs (CVE-2023-20864, ​​CVSS score: 9.8).

upcoming webinars

Defending with Deception: Driving Zero Trust Security

See how Deception can detect advanced threats, stop lateral movement, and strengthen your Zero Trust strategy. Join us for an insightful webinar!

Save my seat!

“An unauthenticated malicious actor with network access to VMware Aria Operations for Logs may be able to execute arbitrary code as root,” said the virtualization service provider.

VMware Aria Operations for Logs 8.12 with a high-severity command injection flaw (CVE-2023-20865, CVSS score: 7.2) that could allow an attacker with administrator privileges to execute arbitrary commands as root , which fixes this vulnerability.

“CVE-2023-20864 is a critical issue and should be patched immediately,” the company said. “It should be emphasized that only version 8.10.2 is affected by this vulnerability.”

This alert comes almost three years after VMware identified two critical remote code execution issues (CVE-2022-31704 and CVE-2022-31706, CVSS score: 9.8) in the same product. It happened months later.

Cisco and VMware appliances have proven to be lucrative targets for threat actors and we encourage users to act quickly to apply the updates to mitigate potential threats.

Did you find this article interesting?Please follow us twitter and LinkedIn to read more exclusive content we post.



Source link

Leave a Reply

Your email address will not be published. Required fields are marked *