• Language chooser
    • USA (English)
    • France (Français)
    • Italy (Italiano)
    • Latin America (Español)
    • Brazil (Portugués)
    • Germany (Deutsch)
    • Korea (한국어)
    • Japan (Beta) (日本語)

VMware Aria Operations for Networks Command Injection Vulnerability

Released: Jun 22, 2023


High Severity

VMware Vendor

Vulnerability Type


Actively exploited in the wild

VMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution. According to the vendor advisory, the vulnerability has been seen exploited in the wild. Learn More »

Common Vulnerabilities and Exposures

CVE-2023-20887

Background

VMware Aria Operations for Networks is a network monitoring tool that helps to build an optimized, highly available and secure network infrastructure across multicloud environments. It consists both SaaS and on-premises solutions. Early June, 2023, VMware Aria Operations for Networks update was released which addressed multiple vulnerabilities. (CVE-2023-20887, CVE-2023-20888, CVE-2023-20889). VMware has confirmed that exploit code (proof-of-concept) for CVE-2023-20887 is available online.

Latest Development

Recent news and incidents related to cybersecurity threats encompassing various events such as data breaches, cyber-attacks, security incidents, and vulnerabilities discovered.


June 7, 2023: VMware Aria Operations for Networks released security advisory.
https://www.vmware.com/security/advisories/VMSA-2023-0012.html

June 20, 2023: VMware confirmed that exploitation of CVE-2023-20887 has occurred in the wild.


June 22, 2023: CISA added CVE-2023-20887 to its known exploited vulnerability catalog (KEV).

June 22, 2023: FortiGuard Labs has released the IPS signature to block any attack attempts targeting the vulnerability (CVE-2023-20887). To remediate risk completely, apply the updates listed on the vendor links provided.
https://kb.vmware.com/s/article/92684

FortiGuard Cybersecurity Framework

Mitigate security threats and vulnerabilities by leveraging the range of FortiGuard Services.


PROTECT
  • IPS

  • Web App Security

  • Post-execution

DETECT
  • Threat Hunting

  • Outbreak Detection

  • Content Update

RESPOND
  • Assisted Response Services

  • Automated Response

RECOVER
  • InfoSec Services

IDENTIFY
  • Attack Surface Monitoring (Inside & Outside)

Threat Intelligence

Information gathered from analyzing ongoing cybersecurity events including threat actors, their tactics, techniques, and procedures (TTPs), indicators of compromise (IOCs), malware and related vulnerabilities.


Loading ...

Indicators of compromise Indicators of compromise
IOC Indicator List
Indicator Type Status
185.225.74.16 ip Active
193.187.172.27 ip Active
Indicators of compromise Indicators of compromise
IOC Threat Activity

Last 30 days

Chg

Avg 0