
VMware has released patches to address multiple vulnerabilities affecting its Aria Operations product.
The first vulnerability identified as CVE-2024-38830 with a CVSS score of 7.8 , could allow a malicious actor with local administrative privileges to escalate privileges to the root user on the appliance running VMware Aria Operations.
The second vulnerability, CVE-2024-38831 with a CVSS score of 7.8, could allow a malicious actor with local administrative privileges to insert malicious commands into the properties file to escalate privileges to a root user on the appliance running VMware Aria Operations.
The other vulnerabilities, CVE-2024-38832 with a CVSS score of 7.1, CVE-2024-38833 with a CVSS score of 6.8, and CVE-2024-38834 with a CVSS score of 7.5 is related stored cross-site scripting (XSS). These vulnerabilities could allow a malicious actor with various levels of access to inject malicious scripts, potentially leading to unauthorized actions or data theft.
The affected versions include VMware Aria Operations 8.x and VMware Cloud Foundation (4.x and 5.x). Users must update to version 8.18.2 or later to address these vulnerabilities.
VMware expressed gratitude to the security researchers who reported these vulnerabilities, including individuals from MoyunSec Vlab, Michelin CERT, and independent researchers.
For more information, refer the advisory.