Menu

  • Alerts
  • Incidents
  • News
  • APTs
  • Cyber Decoded
  • Cyber Hygiene
  • Cyber Review
  • Cyber Tips
  • Definitions
  • Malware
  • Threat Actors
  • Tutorials

Useful Tools

  • Password generator
  • Report an incident
  • Report to authorities
No Result
View All Result
CTF Hack Havoc
CyberMaterial
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
Hall of Hacks
  • Education
    • Cyber Decoded
    • Definitions
  • Information
    • Alerts
    • Incidents
    • News
  • Insights
    • Cyber Hygiene
    • Cyber Review
    • Tips
    • Tutorials
  • Support
    • Contact Us
    • Report an incident
  • About
    • About Us
    • Advertise with us
Get Help
No Result
View All Result
Hall of Hacks
CyberMaterial
No Result
View All Result
Home Alerts

Unauthenticated Attackers Target VMware

October 25, 2023
Reading Time: 4 mins read
in Alerts

VMware, a prominent provider of virtualization software, has issued a caution to administrators and customers concerning the availability of a proof-of-concept (PoC) exploit code for a critical authentication bypass flaw found in vRealize Log Insight, now named VMware Aria Operations for Logs. Tracked as CVE-2023-34051, this vulnerability could be exploited by unauthenticated attackers to execute code remotely with root-level permissions, subject to specific conditions being met.

Furthermore, the flaw was discovered by Horizon3 security researchers, who have performed a technical root cause analysis of the vulnerability, demonstrating how CVE-2023-34051 can be used to achieve remote code execution as the root user on unpatched VMware appliances. The researchers have also released a PoC exploit and indicators of compromise (IOCs) to assist network defenders in identifying potential exploitation attempts within their environments.

Moreover, this vulnerability serves as a bypass for an exploit chain involving critical flaws that VMware had previously patched in January. These vulnerabilities include a directory traversal bug (CVE-2022-31706), a broken access control flaw (CVE-2022-31704), and an information disclosure bug (CVE-2022-31711).

By chaining these vulnerabilities together, attackers can inject maliciously crafted files into the operating systems of unpatched VMware appliances running Aria Operations for Logs software. The Horizon3 security researchers have noted that their remote code execution (RCE) exploit “abuses various Thrift RPC endpoints to achieve an arbitrary file write”. They also emphasized that while the vulnerability is relatively easy to exploit, it requires attackers to have certain infrastructure in place to deliver malicious payloads.

Additionally, they mentioned that the product is unlikely to be exposed to the internet, implying that attackers likely have an established foothold elsewhere on the network. Despite this, threat actors often leverage vulnerabilities within previously compromised networks to facilitate lateral movement, making vulnerable VMware appliances valuable internal targets.

References:
  • VMware – VMSA-2023-0021
  • While we haven’t reversed the Cisco 0-day just yet, we do have the deep-dive and IOCs for CVE-2023-34051 affecting #VMware Aria Operations for Logs.
Tags: AttackersAuthenticationCyber AlertCyber Alerts 2023CybersecurityOctober 2023Proof-of-concept (PoC)ProofpointVmwareVulnerabilities
ADVERTISEMENT

Related Posts

Apple Fixes Critical Bugs in iOS and MacOS

Hackers Exploit Output Messenger Zero-Day

May 13, 2025
Apple Fixes Critical Bugs in iOS and MacOS

ASUS Fixes Critical Flaws in DriverHub

May 13, 2025
Apple Fixes Critical Bugs in iOS and MacOS

Apple Fixes Critical Bugs in iOS and MacOS

May 13, 2025
Microsoft Copilot AI Exposes Sensitive Data

Microsoft Copilot AI Exposes Sensitive Data

May 12, 2025
Microsoft Copilot AI Exposes Sensitive Data

PupkinStealer Targets Data Through Telegram

May 12, 2025
Microsoft Copilot AI Exposes Sensitive Data

Fake AI Video Tools Spread Noodlophile

May 12, 2025

Latest Alerts

Hackers Exploit Output Messenger Zero-Day

ASUS Fixes Critical Flaws in DriverHub

Apple Fixes Critical Bugs in iOS and MacOS

Microsoft Copilot AI Exposes Sensitive Data

PupkinStealer Targets Data Through Telegram

Fake AI Video Tools Spread Noodlophile

Subscribe to our newsletter

    Latest Incidents

    Alleged Steam Breach Exposes 89M Records

    Ulhasnagar Municipal Corporation Hacked

    Madison County Iowa Systems Disrupted

    Mobius Token Exploit Drains $2.15 Million

    Cyberattack Hits Public Agencies in Paraguay

    Cyberattack Hits Università Roma Tre Website

    CyberMaterial Logo
    • About Us
    • Contact Us
    • Jobs
    • Legal and Privacy Policy
    • Site Map

    © 2025 | CyberMaterial | All rights reserved

    Welcome Back!

    Login to your account below

    Forgotten Password?

    Retrieve your password

    Please enter your username or email address to reset your password.

    Log In

    Add New Playlist

    No Result
    View All Result
    • Alerts
    • Incidents
    • News
    • Cyber Decoded
    • Cyber Hygiene
    • Cyber Review
    • Definitions
    • Malware
    • Cyber Tips
    • Tutorials
    • Advanced Persistent Threats
    • Threat Actors
    • Report an incident
    • Password Generator
    • About Us
    • Contact Us
    • Advertise with us

    Copyright © 2025 CyberMaterial