Authentication Bypass in VMware Cloud Director Appliance Versions
CVE-2023-34060

9.8CRITICAL

Key Information:

Vendor
Vmware
Vendor
CVE Published:
14 November 2023

Badges

πŸ“° News Worthy

Summary

The VMware Cloud Director Appliance has a vulnerability that permits malicious actors to bypass authentication on SSH and appliance management console ports (22 and 5480) following an upgrade from an earlier version to 10.5. This flaw arises due to the appliance's use of an affected version of sssd on the underlying Photon OS, which does not occur in fresh installations of 10.5. Users can safeguard their systems by ensuring they upgrade to Photon OS versions sssd-2.8.1-11 or higher, mitigating this security risk. The issue does not affect the primary login portal operating on port 443.

Affected Version(s)

VMware Cloud Director Appliance (VCD Appliance) 10.5 if upgraded from 10.4.x or below.

News Articles

Urgent: VMware Warns of Unpatched Critical Cloud Director Vulnerability

VMware raises the alarm about an unpatched security flaw (CVE-2023-34060) in Cloud Director, which could allow attackers to bypass authentication.

1 year ago

References

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • πŸ“°

    First article discovered by The Hacker News

  • Vulnerability published

  • Vulnerability Reserved

.