VMware Patches High-Severity Vulnerabilities in Aria Operations

VMware Patches High-Severity Vulnerabilities in Aria Operations

November 26, 2024 at 09:39AM

VMware released a high-severity bulletin addressing five security vulnerabilities in its Aria Operations product, affecting versions 8.x and VMware Cloud Foundation 4.x and 5.x. Patches are available to fix local privilege escalation and cross-site scripting exploits. Users are urged to apply patches urgently as no workarounds exist.

### Meeting Takeaways on VMware Security Bulletin

**Date:** Tuesday
**Subject:** VMware Security Bulletin – VMSA-2024-0022

**Key Points:**
1. **Security Bulletin Release:**
– VMware issued a high-severity bulletin addressing five security vulnerabilities in its Aria Operations product.

2. **Vulnerabilities Overview:**
– The vulnerabilities allow potential privilege escalation and cross-site scripting (XSS) attacks by malicious actors:
– **CVE-2024-38830**: Local privilege escalation (CVSS 7.8) – Requires local admin privileges for root access.
– **CVE-2024-38831**: Local privilege escalation (CVSS 7.8) – Allows root privilege escalation via property file modifications.
– **CVE-2024-38832**: Stored XSS (CVSS 7.1) – Enables script injection for users with editing access to views.
– **CVE-2024-38833**: Stored XSS (CVSS 6.8) – Allows script injection through email templates.
– **CVE-2024-38834**: Stored XSS (CVSS 6.5) – Targets script injection in cloud provider editing functions.

3. **Affected Products:**
– VMware Aria Operations (version 8.x).
– VMware Cloud Foundation (versions 4.x and 5.x utilizing Aria Operations).

4. **Urgent Action Required:**
– Corporate users must apply the available patches immediately, as there are no workarounds provided.

5. **Contextual Risks:**
– VMware products, especially virtualization technology, have been major targets for advanced hacking groups.
– Multiple vulnerabilities related to VMware are listed in the CISA Known Exploited Vulnerabilities (KEV) catalog.

### Next Steps:
– Ensure all affected VMware products are updated with the latest patches.
– Monitor for any further communications from VMware regarding these vulnerabilities.

Full Article