VMWare Aria Operations for Networks Authentication Bypass (CVE-2023-34039) (Direct Check)

critical Nessus Plugin ID 183238

Synopsis

The web application running on the remote web server is affected by an authentication bypass vulnerability.

Description

Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.

Solution

Upgrade to VMWare Aria Operations for Networks 6.2.0.1688977536, 6.3.0.1688986302, 6.4.0.1689079386, 6.5.1.1688974096, 6.6.0.1688979729, 6.7.0.1688972173, 6.8.0.1688989059, 6.9.0.1688995771, or 6.10.0.1692934256 or later.

See Also

https://www.vmware.com/security/advisories/VMSA-2023-0018.html

Plugin Details

Severity: Critical

ID: 183238

File Name: vmware_aria_operations_for_networks_cve-2023-34039.nbin

Version: 1.25

Type: remote

Family: Web Servers

Published: 10/17/2023

Updated: 4/23/2024

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2023-34039

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:vmware:vrealize_network_insight, x-cpe:/a:vmware:aria_operations_for_networks

Required KB Items: installed_sw/VMware Aria Operations for Networks

Exploit Available: true

Exploit Ease: Exploits are available

Exploited by Nessus: true

Patch Publication Date: 8/29/2023

Vulnerability Publication Date: 8/29/2023

Exploitable With

Metasploit (VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure)

Reference Information

CVE: CVE-2023-34039