Wednesday , May 14 2025

Indian CERT Issues Alert on Vulnerabilities in VMware, Patches Issued

The Indian Computer Emergency Response Team (CERT-IN) has issued an alert on vulnerabilities in VMware Aria Operations.

Versions of VMware Aria Operations prior to 8.12 are vulnerable to cyberattacks due to the high-severity vulnerabilities published in the CERT-IN vulnerability note CIVN-2023-1032, with a severity rating of High.

CVSS 10.0 Flaw
Critical flaw in Siemens OZW Web Servers Enable Unauthenticated RCE

Siemens issued a security advisory (SSA-047424) for two serious vulnerabilities—CVE-2025-26389 and CVE-2025-26390—impacting the OZW672 and OZW772 web servers. These servers...
Read More
CVSS 10.0 Flaw  Critical flaw in Siemens OZW Web Servers Enable Unauthenticated RCE

Microsoft Patch Tuesday May 2025: 72 flaws, 5 Actively Exploited Zero-Day

Microsoft has released its Patch Tuesday updates for May 2025, addressing a total of 78 vulnerabilities across its product ecosystem,...
Read More
Microsoft Patch Tuesday May 2025: 72 flaws, 5 Actively Exploited Zero-Day

OTP glitch disrupted NID services across the country

NID services in Bangladesh are temporarily suspended due to issues with delivering One-Time Passwords (OTP) needed to access the NID...
Read More
OTP glitch disrupted NID services across the country

Google to pay Texas $1.4 billion for location tracking practices

Google will pay about $1.4 billion to Texas to settle two lawsuits regarding location tracking and biometric data storage without...
Read More
Google to pay Texas $1.4 billion for location tracking practices

YouTube geo-blocks at least 4 Bangladeshi TV channels in India

YouTube has restricted access to at least four Bangladeshi television channels in India following a takedown request from the Indian...
Read More
YouTube geo-blocks at least 4 Bangladeshi TV channels in India

Microsoft Patches Four Critical Azure and Power Apps Vulns

Microsoft has fixed critical vulnerabilities in its core cloud services, including Azure Automation, Azure Storage, Azure DevOps, and Microsoft Power...
Read More
Microsoft Patches Four Critical Azure and Power Apps Vulns

Qilin Ransomware topped April 2025 with 45+ data leak disclosures

The cyber threat landscape is rapidly changing, with a notable increase in ransomware activity in April 2025, driven by the...
Read More
Qilin Ransomware topped April 2025 with 45+ data leak disclosures

SonicWall Patches 3 Flaws in SMA 100 Devices

SonicWall has released patches for three security flaws in SMA 100 Secure Mobile Access appliances that could allow remote code...
Read More
SonicWall Patches 3 Flaws in SMA 100 Devices

Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

From April 2024 to April 2025, Flashpoint analysts noted that the financial sector was a major target for threat actors,...
Read More
Top Ransomware Actively Attacking Financial Sector: 406 Incidents Disclosed

Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

Cisco has issued a security advisory for a critical vulnerability in its IOS XE Software for Wireless LAN Controllers (WLCs)....
Read More
Critical (CVSS 10) Flaw in Cisco IOS XE WLCs Allows RRA

VMware has issued patches for these vulnerabilities.

 Details about vulnerabilities inVMware

The company advisory about the vulnerabilities in VMware stated that the CVSSv3 range of the flaws was between 6.4 and 8.8. The flaws were alerted to the company by MoyunSec Vlab and Bing for which it made updates and workarounds available.

The vulnerabilities in VMware listed in the CERT-IN alert were as follows:

  1. CVE-2023-20877 was a privilege escalation flaw with a CVSSv3 base score of 8.8. This flaw can allow hackers to run malicious codes on unpatched devices.
  2. CVE-2023-20878 was a moderate-severity deserialization bug with a CVSSv3 base score of 6.6. If the product is not updated, hackers can run arbitrary codes just like the above flaw. They can also disrupt the system.
  3. CVE-2023-20879 was a moderate-severity bug that allowed local privilege escalation. It had a CVSSv3 base score of 6.7. Hackers may gain administrative privileges like the above vulnerability and run arbitrary codes.
  4. CVE-2023-20880 was also a moderate-severity bug that allowed local privilege escalation. It had a CVSSv3 base score of 6.4. Hackers can escalate privileges to the root and cause more damage with escalated privileges on unpatched devices.

Version 8.10 Hot Fix 4 to address the vulnerabilities in VMware

Patches were made available for the vulnerabilities in VMware, which should be upgraded by users to avoid leaving the product and device exposed to hackers.

Vulnerabilities are a common and major cause of exploitation as hackers are always on the lookout for flaws that lets them make their way into systems. One unpatched system endangers the entire network of even patched software including devices that are connected to it.

Called hot fix 4 (91852), VMware made patches available for all the users. The fixes page was updated on May 11, 2023, and it addressed the following issues:

  1. VMware chargeback bills creating inaccurate results.
  2. Bills showing only Tier 1 value excluding Tier 2 on vapp.

“vRealize Operations 8.10 Hot Fix 4 can be applied to any 8.10 environment. Upgrading from older versions directly to this Hot Fix is not supported. You must upgrade to 8.10 before applying this Hot Fix,” the VMware patch report read followed by instructions on how to complete the software update.

The vulnerabilities in VMware can be patched by first downloading the minimum version required for the hot fix. Thereafter, a user may select the following options as recommended in the company alert:

  1. Choose vRealize Operations Manager for Product
  2. Opt for 10 for the version
  3. Select Search for the right version and log in to the primary node vRealize Operations Manager Administrator interface.
  4. Opt for Software Update as shown on the individual device.
  5. And go for the Install a Software Update

One will have to locate the PAK file and wait for the software to update following which the user will be logged out. Once the upgrade is successfully completed, users will see the cluster status changed to ‘Online.’

To make sure the upgrade is completed, one may have to clear the browser caches and see that the page is refreshed.

Vulnerability management and cybersecurity

According to Dan Richings, SVP – Global Presales and Solutions Engineering at Adaptiva, companies face several challenges when it comes to patch management.

One challenge is the overwhelming influx of patches, leading to a backlog that needs prioritization based on usage and security severity. Remote work and the use of personal devices add complexity to securing and monitoring updates.

Communication issues arise when different IT teams handle various tasks, and slow change management processes and flawed patches further impede the patching process. Additionally, many organizations still rely on manual patching, which consumes significant time and resources.

Source: cyberexpress

Check Also

Protect AI

Palo Alto Networks to Acquire AI Security Firm “Protect AI”

On Monday, Palo Alto Networks confirmed it is acquiring the US-based AI security company Protect …

Leave a Reply

Your email address will not be published. Required fields are marked *