Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Unauthenticated Attackers Target VMware

October 25, 2023
Reading Time: 4 mins read
in Alerts

VMware, a prominent provider of virtualization software, has issued a caution to administrators and customers concerning the availability of a proof-of-concept (PoC) exploit code for a critical authentication bypass flaw found in vRealize Log Insight, now named VMware Aria Operations for Logs. Tracked as CVE-2023-34051, this vulnerability could be exploited by unauthenticated attackers to execute code remotely with root-level permissions, subject to specific conditions being met.

Furthermore, the flaw was discovered by Horizon3 security researchers, who have performed a technical root cause analysis of the vulnerability, demonstrating how CVE-2023-34051 can be used to achieve remote code execution as the root user on unpatched VMware appliances. The researchers have also released a PoC exploit and indicators of compromise (IOCs) to assist network defenders in identifying potential exploitation attempts within their environments.

Moreover, this vulnerability serves as a bypass for an exploit chain involving critical flaws that VMware had previously patched in January. These vulnerabilities include a directory traversal bug (CVE-2022-31706), a broken access control flaw (CVE-2022-31704), and an information disclosure bug (CVE-2022-31711).

By chaining these vulnerabilities together, attackers can inject maliciously crafted files into the operating systems of unpatched VMware appliances running Aria Operations for Logs software. The Horizon3 security researchers have noted that their remote code execution (RCE) exploit “abuses various Thrift RPC endpoints to achieve an arbitrary file write”. They also emphasized that while the vulnerability is relatively easy to exploit, it requires attackers to have certain infrastructure in place to deliver malicious payloads.

Additionally, they mentioned that the product is unlikely to be exposed to the internet, implying that attackers likely have an established foothold elsewhere on the network. Despite this, threat actors often leverage vulnerabilities within previously compromised networks to facilitate lateral movement, making vulnerable VMware appliances valuable internal targets.

References:
  • VMware – VMSA-2023-0021
  • While we haven’t reversed the Cisco 0-day just yet, we do have the deep-dive and IOCs for CVE-2023-34051 affecting #VMware Aria Operations for Logs.
Tags: AttackersAuthenticationCyber AlertCyber Alerts 2023CybersecurityOctober 2023Proof-of-concept (PoC)ProofpointVmwareVulnerabilities
ADVERTISEMENT

Related Posts

Hackers Use Leaked Shellter License Malware

Windows BitLocker Vulnerability Flaw

July 9, 2025
Hackers Use Leaked Shellter License Malware

Hackers Use Leaked Shellter License Malware

July 9, 2025
Hackers Use Leaked Shellter License Malware

Anatsa Android Trojan Targets 90K Users

July 9, 2025
AMOS Mac Stealer Adds Persistent Backdoor

AMOS Mac Stealer Adds Persistent Backdoor

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

NordDragonScan Malware Steals Windows Data

July 8, 2025
AMOS Mac Stealer Adds Persistent Backdoor

New Ransomware BERT Targets ESXi Systems

July 8, 2025

Latest Alerts

Windows BitLocker Vulnerability Flaw

Anatsa Android Trojan Targets 90K Users

Hackers Use Leaked Shellter License Malware

New Ransomware BERT Targets ESXi Systems

NordDragonScan Malware Steals Windows Data

AMOS Mac Stealer Adds Persistent Backdoor

Subscribe to our newsletter

    Latest Incidents

    Credit Reports Breached And Sold On Dark Web

    Recruiting Software Exposed 26M Resumes

    Norwegian Municipalities Hit by Data Breach

    French Chip Firm Semco Hacked During IPO

    Louis Vuitton Korea Hit By Cyberattack

    Virginia School District Hit By Cyberattack

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial