9.8
CVSSv3

CVE-2023-20887

Published: 07/06/2023 Updated: 26/07/2023
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 0

Vulnerability Summary

This vulnerability allows remote malicious users to execute arbitrary code on affected installations of VMware Aria Operations for Networks. Authentication is not required to exploit this vulnerability. The specific flaw exists within the createSupportBundle method. The issue results from the lack of proper validation of a user-supplied string before using it to execute a system call. An attacker can leverage this vulnerability to execute code in the context of root.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware vrealize network insight

Exploits

VMWare Aria Operations for Networks (vRealize Network Insight) is vulnerable to command injection when accepting user input through the Apache Thrift RPC interface This vulnerability allows a remote unauthenticated attacker to execute arbitrary commands on the underlying operating system as the root user The RPC interface is protected by a revers ...

Github Repositories

VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)

CVE-2023-20887 Exploit VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887) Usage usage: exploitpy [-h] -t TARGET [-l LOCALHOST] [-p LOCALPORT] optional arguments: -h, --help show this help message and exit -t TARGET, --target TARGET Target url, localhost:9000 -l LOCALHOST, --localhost LOCALHOST

VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)

CVE-2023-20887 POC for CVE-2023-20887 VMWare Aria Operations for Networks (vRealize Network Insight) unauthenticated RCE Technical Analysis A root cause analysis of the vulnerability can be found on my blog: kushagraojhamediumcom/vmware-vrealize-network-insight-cve-2023-20887-193f3c3d30a0 Summary VMWare Aria Operations for Networks (vRealize Network Insight) is vulner

CVE-2023-20887 POC for CVE-2023-20887 VMWare Aria Operations for Networks (vRealize Network Insight) unauthenticated RCE Technical Analysis A root cause analysis of the vulnerability can be found on my blog: summoningteam/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/

VMWare vRealize Network Insight Pre-Authenticated RCE (CVE-2023-20887)

CVE-2023-20887 POC for CVE-2023-20887 VMWare Aria Operations for Networks (vRealize Network Insight) unauthenticated RCE Technical Analysis A root cause analysis of the vulnerability can be found on my blog: summoningteam/blog/vmware-vrealize-network-insight-rce-cve-2023-20887/

Recent Articles

A (cautionary) tale of two patched bugs, both exploited in the wild
The Register

Topics Security Off-Prem On-Prem Software Offbeat Special Features Vendor Voice Vendor Voice Resources One affects VMware's monitoring tool and the other TP-Link routers

Miscreants are right now exploiting two security bugs for which patches exist, one in a VMware network and applications monitoring tool and the other in some TP-Link routers. VMware two weeks ago issued a fix for CVE-2023-20887, a critical command-injection vulnerability in Aria Operations for Networks that can be abused to achieve remote code execution. Meanwhile, TP-Link patched CVE-2023-1389 in mid-March. This is another command-injection vulnerability that can lead to remote code execution. ...