Lucene search

K
cve[email protected]CVE-2023-20891
HistoryJul 26, 2023 - 6:15 a.m.

CVE-2023-20891

2023-07-2606:15:10
CWE-532
web.nvd.nist.gov
2417
vmware
tanzu application service
vms
isolation segment
information disclosure
vulnerability
hex encoding
audit logs
nvd

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.2%

The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.

Affected configurations

NVD
Node
vmwareisolation_segmentRange2.11.02.11.35
OR
vmwareisolation_segmentRange2.13.02.13.20
OR
vmwareisolation_segmentRange3.0.03.0.13
OR
vmwareisolation_segmentRange4.0.04.0.4
OR
vmwaretanzu_application_service_for_virtual_machinesRange2.11.02.11.42
OR
vmwaretanzu_application_service_for_virtual_machinesRange2.13.02.13.24
OR
vmwaretanzu_application_service_for_virtual_machinesRange3.0.03.0.14
OR
vmwaretanzu_application_service_for_virtual_machinesRange4.0.04.0.5

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux",
      "MacOS",
      "Android",
      "iOS",
      "ARM",
      "x86",
      "64 bit",
      "32 bit"
    ],
    "product": "VMware Tanzu Application Service for VMs",
    "vendor": "VMware",
    "versions": [
      {
        "lessThan": "4.0.5",
        "status": "affected",
        "version": "4.0.x",
        "versionType": "4.0.5"
      },
      {
        "lessThan": "3.0.14",
        "status": "affected",
        "version": "3.0.x",
        "versionType": "3.0.14"
      },
      {
        "lessThan": "2.13.24",
        "status": "affected",
        "version": "2.13.x",
        "versionType": "2.13.24"
      },
      {
        "lessThan": "2.11.42",
        "status": "affected",
        "version": "2.11.x",
        "versionType": "2.11.42"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux",
      "Android",
      "ARM",
      "x86",
      "64 bit",
      "iOS",
      "MacOS",
      "32 bit"
    ],
    "product": "Isolation segment",
    "vendor": "VMware",
    "versions": [
      {
        "lessThan": "4.0.4",
        "status": "affected",
        "version": "4.0.x",
        "versionType": "4.0.4"
      },
      {
        "lessThan": "3.0.13",
        "status": "affected",
        "version": "3.0.x",
        "versionType": "3.0.13"
      },
      {
        "lessThan": "2.13.20",
        "status": "affected",
        "version": "2.13.x",
        "versionType": "2.13.20"
      },
      {
        "lessThan": "2.11.35",
        "status": "affected",
        "version": "2.11.x",
        "versionType": "2.11.35"
      }
    ]
  }
]

6.5 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

6.2 Medium

AI Score

Confidence

High

0.0005 Low

EPSS

Percentile

18.2%

Related for CVE-2023-20891