Important
VMware vRealize Orchestrator update addresses an XML External Entity (XXE) vulnerability (CVE-2023-20855)
Sign up for Security Advisories Stay up to date on the latest VMware Security advisories and updates. Close *Email An XML External Entity (XXE) vulnerability affecting VMware vRealize Orchestrator was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.
Run VMware on any Cloud. Any Environment. Anywhere.
Accelerate and ensure the success of your generative AI initiatives with multi-cloud flexibility, choice, privacy and control.
A new, simplified partner program to help achieve even greater opportunities for profitability.
Important
An XML External Entity (XXE) vulnerability affecting VMware vRealize Orchestrator was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.
Description
VMware vRealize Orchestrator contains an XML External Entity (XXE) vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.8.
Known Attack Vectors
A malicious actor, with non-administrative access to vRealize Orchestrator, may be able to use specially crafted input to bypass XML parsing restrictions leading to access to sensitive information or possible escalation of privileges.
Resolution
To remediate CVE-2023-20855 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' below.
Workarounds
None.
Additional Documentation
None.
Notes
VMware vRealize Automation 8.x is affected since it uses embedded vRealize Orchestrator.
Acknowledgements
VMware would like to thank IT.NRW for reporting this issue to us.
Response Matrix
Impacted Product Suites that Deploy Response Matrix Components:
VMware vRealize Orchestrator 8.11.1
Downloads and Documentation:
VMware vRealize Automation 8.11.1
Downloads and Documentation:
VMware Cloud Foundation (vRealize Automation) KB90926: https://kb.vmware.com/s/article/90926
Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20855
FIRST CVSSv3 Calculator:
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
2023-02-21 VMSA-2023-0005
Initial security advisory.
E-mail: security@vmware.com
PGP key at:
https://kb.vmware.com/kb/1055
VMware Security Advisories
https://www.vmware.com/security/advisories
VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html
VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html
VMware Security & Compliance Blog
https://blogs.vmware.com/security
Twitter
https://twitter.com/VMwareSRC
Copyright 2023 VMware Inc. All rights reserved.
Support