November 14, 2023 at 11:27PM
VMware has issued a warning about a critical security flaw in Cloud Director that could allow unauthorized access. The vulnerability affects instances upgraded to version 10.5 and can be exploited to bypass login restrictions on certain ports. A fix has not yet been released, but a workaround is available. This comes after VMware recently patched another serious flaw in vCenter Server.
Key Takeaways from the Meeting Notes:
– VMware has identified a critical and unpatched security flaw in Cloud Director that could be exploited by a malicious actor to bypass authentication protections.
– The vulnerability, known as CVE-2023-34060, affects instances that have been upgraded to version 10.5 from an older version.
– The bypass allows a malicious actor with network access to the appliance to authenticate on port 22 (ssh) or port 5480 (appliance management console), but not on port 443 (VCD provider and tenant login).
– The impact is due to the use of an affected version of sssd from the underlying Photon OS.
– The vulnerability was discovered and reported by Dustin Hartle from Ideal Integrations.
– While a fix from VMware is not yet available, a shell script (WA_CVE-2023-34060.sh) has been provided as a workaround.
– Implementing the workaround will not require downtime or affect the functionality of Cloud Director installations.
– This security flaw comes shortly after VMware released patches for another critical flaw in the vCenter Server (CVE-2023-34048) that could lead to remote code execution on affected systems.