Lucene search

K
saintSAINT CorporationSAINT:A46144C15AAE6CFF6670C3DCA0F8458C
HistorySep 06, 2023 - 12:00 a.m.

VMware Aria Operations for Networks default SSH key

2023-09-0600:00:00
SAINT Corporation
my.saintcorporation.com
45
vmware
aria operations
networks
ssh key
vulnerability
fix
remote attacker
privileged access
support user
vmsa-2023-0018
linux
unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.945 High

EPSS

Percentile

99.2%

Added: 09/06/2023

Background

SSH Private keys are used for authentication for many devices. Devices shipped with a default, static key are vulnerable to compromise if the public discovers the key. The private key can be re-used by an attacker to gain remote, privileged access to the device.

Problem

Default SSH keys in VMware Aria Operations for Networks could allow a remote attacker with knowledge of the private key to gain access as the support user.

Resolution

Apply the fix referenced in VMSA-2023-0018.

References

<https://www.vmware.com/security/advisories/VMSA-2023-0018.html&gt;
<https://summoning.team/blog/vmware-vrealize-network-insight-rce-cve-2023-34039/&gt;

Platforms

Linux
Unix

9.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

0.945 High

EPSS

Percentile

99.2%