Attacker Value
Very High
(1 user assessed)
Exploitability
High
(1 user assessed)
User Interaction
None
Privileges Required
None
Attack Vector
Network
3

CVE-2023-34039

Disclosure Date: August 29, 2023
Add MITRE ATT&CK tactics and techniques that apply to this CVE.

Description

Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.

Add Assessment

1
Ratings
Technical Analysis

The transition of VMWare Aria Operations for Networks (vRealize Network Insight) from version 6.0 to 6.10 failed to generate new SSH keys for the support and ubuntu users. Consequently, this oversight enabled a malicious actor with SSH access to attain root shell access to the product.

Every iteration of VMware’s Aria Operations for Networks possesses a distinct SSH key. Crafting a comprehensive exploit necessitated the assembly of these keys from various product versions. It’s worth noting that the most recent release, 6.11, remains immune to this problem as VMware had rectified the issue before its launch.

CVSS V3 Severity and Metrics
Base Score:
9.8 Critical
Impact Score:
5.9
Exploitability Score:
3.9
Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope (S):
Unchanged
Confidentiality (C):
High
Integrity (I):
High
Availability (A):
High

General Information

Vendors

  • vmware

Products

  • aria operations for networks

Additional Info

Technical Analysis