Skip to content

VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities - 20231026001

Overview

VMware has released updates to address the VMware vCenter Server Out-of-Bounds Write and information disclosure vulnerabilities which would allow threat actors to perform remote code execution and access unauthorised data respectively.

What is the vulnerability?

CVE-2023-34048 - CVSS v3 Base Score: 9.8

  • This vulnerability allows malicious actor(s) with network access to vCenter Server to perform remote code execution.

CVE-2023-34056 - CVSS v3 Base Score: 4.3

  • A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data.

What is vulnerable?

The vulnerability affects the following products:

  • VMware vCenter Server 8.0
  • VMware vCenter Server 7.0
  • VMware Cloud Foundation (VMware vCenter Server) 5.x, 4.x

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of one month... (refer Patch Management):

Product Version CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
VMware vCenter Server 8.0 CVE-2023-34048, CVE-2023-34056 9.8, 4.3 Critical 8.0U2 None FAQ
VMware vCenter Server 8.0 CVE-2023-34048 9.8 Critical 8.0U1d None FAQ
VMware vCenter Server 7.0 CVE-2023-34048, CVE-2023-34056 9.8, 4.3 Critical 7.0U3o None FAQ
VMware Cloud Foundation (VMware vCenter Server) 5.x, 4.x CVE-2023-34048, CVE-2023-34056 9.8, 4.3 Critical KB88287 None FAQ

Additional References