VMware fixes multiple vulnerabilities in Aria Product

VMware fixes multiple vulnerabilities in Aria Product


VMware has released patches to address multiple vulnerabilities affecting its Aria Operations product.

The first vulnerability identified as CVE-2024-38830 with a CVSS score of 7.8 , could allow a malicious actor with local administrative privileges to escalate privileges to the root user on the appliance running VMware Aria Operations.

The second vulnerability, CVE-2024-38831 with a CVSS score of 7.8, could allow a malicious actor with local administrative privileges to insert malicious commands into the properties file to escalate privileges to a root user on the appliance running VMware Aria Operations.

Advertisements

The other vulnerabilities, CVE-2024-38832 with a CVSS score of 7.1, CVE-2024-38833 with a CVSS score of 6.8, and CVE-2024-38834 with a CVSS score of 7.5 is related stored cross-site scripting (XSS). These vulnerabilities could allow a malicious actor with various levels of access to inject malicious scripts, potentially leading to unauthorized actions or data theft.

The affected versions include VMware Aria Operations 8.x and VMware Cloud Foundation (4.x and 5.x). Users must update to version 8.18.2 or later to address these vulnerabilities.

VMware expressed gratitude to the security researchers who reported these vulnerabilities, including individuals from MoyunSec Vlab, Michelin CERT, and independent researchers.

For more information, refer the advisory.

Comments

No comments yet. Why don’t you start the discussion?

    Leave a Reply

    This site uses Akismet to reduce spam. Learn how your comment data is processed.