Home > Cyber News > CVE-2023-34060: Critical VMware Flaw Poses Significant Risks
CYBER NEWS

CVE-2023-34060: Critical VMware Flaw Poses Significant Risks

VMware has issued a warning about a critical and unpatched vulnerability, tracked as CVE-2023-34060, in its Cloud Director platform. The flaw, with a severity score of 9.8 (CVSS), poses a significant risk by allowing a malicious actor to circumvent authentication protections. Instances upgraded to version 10.5 from an older iteration are particularly vulnerable. The company highlights that on an upgraded version, an attacker with network access can bypass login restrictions on specific ports, presenting a serious security concern.

CVE-2023-34060- Critical VMware Flaw Poses Significant Risks

Details of the CVE-2023-34060 Vulnerability

VMware has identified that the vulnerability affects instances upgraded to Cloud Director Appliance 10.5 from previous versions. Specifically, a malicious actor with network access can exploit the flaw to circumvent login restrictions on ports 22 (ssh) or 5480 (appliance management console). Notably, this bypass does not apply to port 443 (VCD provider and tenant login). The company emphasizes that a new installation of Cloud Director Appliance 10.5 is not susceptible to this particular bypass.

Credit for discovering and reporting this critical flaw goes to Dustin Hartle from Ideal Integrations, an IT solutions provider. VMware acknowledges the proactive reporting, highlighting the collaborative efforts within the cybersecurity community to identify and address vulnerabilities promptly.

Current Status of CVE-2023-34060 and Mitigation Measures

As of now, VMware has not released a fix for CVE-2023-34060 but has provided a workaround in the form of a shell script (“WA_CVE-2023-34060.sh”). Importantly, implementing this temporary mitigation does not necessitate downtime and has no adverse effects on the functionality of Cloud Director installations. This swift response aims to empower users to take immediate steps to secure their environments while awaiting a comprehensive solution from VMware.




This development follows closely on the heels of VMware addressing another critical flaw (CVE-2023-34048, CVSS score: 9.8) in vCenter Server that had the potential for remote code execution on affected systems. The recurrence of critical vulnerabilities emphasizes the ongoing importance of robust cybersecurity practices and the need for organizations to stay vigilant in securing their virtualized environments.

Conclusion
VMware Cloud Director users are urged to take immediate action to implement the provided workaround, considering the severity of CVE-2023-34060. The collaborative efforts of security researchers, as demonstrated by Dustin Hartle’s discovery, underscore the communal responsibility to maintain the integrity and security of virtualization platforms.

Milena Dimitrova

An inspired writer and content manager who has been with SensorsTechForum since the project started. A professional with 10+ years of experience in creating engaging content. Focused on user privacy and malware development, she strongly believes in a world where cybersecurity plays a central role. If common sense makes no sense, she will be there to take notes. Those notes may later turn into articles! Follow Milena @Milenyim

More Posts

Follow Me:
Twitter

Leave a Comment

Your email address will not be published. Required fields are marked *

This website uses cookies to improve user experience. By using our website you consent to all cookies in accordance with our Privacy Policy.
I Agree