VMware revealed several critical vulnerabilities in its Aria Operations product, with the most severe allowing attackers to gain root user privileges on affected systems.
The advisory, VMSA-2024-0022, released on November 26, 2024, addresses five distinct vulnerabilities:
By infosecbulletin
/ Thursday , December 5 2024
Every day a lot of cyberattack happen around the world including ransomware, Malware attack, data breaches, website defacement and so...
Read More
By infosecbulletin
/ Thursday , December 5 2024
Multiple vulnerabilities found in I-O DATA routers UD-LT1 and UD-LT1/EX are being actively exploited. JPCERT/CC, a Japanese cybersecurity organization, has...
Read More
By infosecbulletin
/ Wednesday , December 4 2024
National Security Agency (NSA), The Cybersecurity and Infrastructure Security Agency (CISA) and Federal Bureau of Investigation (FBI) jointly published guideline...
Read More
By infosecbulletin
/ Wednesday , December 4 2024
CISA has issued an alert about three critical security vulnerabilities that are currently being exploited. These issues are now part...
Read More
By infosecbulletin
/ Tuesday , December 3 2024
Cisco has released an updated security advisory about CVE-2014-2120, a vulnerability in the WebVPN login page of Cisco Adaptive Security...
Read More
By infosecbulletin
/ Tuesday , December 3 2024
A serious zero-day vulnerability has been found in TP-Link Archer, Deco, and Tapo routers, which could let attackers inject harmful...
Read More
By infosecbulletin
/ Monday , December 2 2024
IBM revealed several critical vulnerabilities in its Security Verify Access Appliance, which could pose serious security risks to users identified...
Read More
By infosecbulletin
/ Monday , December 2 2024
Cybersecurity researchers are alerting users about phishing email campaigns using a toolkit called "Rockstar 2FA" to steal Microsoft 365 account...
Read More
By infosecbulletin
/ Sunday , December 1 2024
A workshop on "DDoS use cases & solutions for government & BFSI" held at Bangladesh computer society premises on Saturday...
Read More
By infosecbulletin
/ Saturday , November 30 2024
Uganda’s finance ministry confirmed media reports that hackers breached the central bank’s systems and stole money, but refuted the claims...
Read More
CVE-2024-38831 is a local privilege escalation vulnerability with a CVSSv3 score of 7.8.
CVE-2024-38832 is a stored XSS vulnerability that has a CVSSv3 score of 7.1.
CVE-2024-38833 is a stored XSS vulnerability with a CVSSv3 score of 6.8.
CVE-2024-38834: A third stored XSS vulnerability with a CVSSv3 score of 6.5.
Stored XSS vulnerabilities (CVE-2024-38832, CVE-2024-38833, CVE-2024-38834) let attackers with editing permissions inject harmful scripts into views, email templates, and cloud provider settings. These scripts can run when other users access those parts of the application.
Vulnerabilities affect VMware Aria Operations versions 8.x up to 8.18.1, as well as VMware Cloud Foundation versions 4.x and 5.x that include it.
Patches Released:
VMware has issued patches for vulnerabilities, and users should update to version 8.18.2 of VMware Aria Operations to fix all five issues. Since there are no workarounds, it’s important for organizations to apply the patches promptly.
VMware has recognized several security researchers, including those from MoyunSec Vlab, Bing, and the Michelin CERT team, for responsibly reporting vulnerabilities.