Security
Headlines
HeadlinesLatestCVEs

Headline

CVE-2023-20891: VMSA-2023-0016

The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.

CVE
#vulnerability#vmware

Advisory ID: VMSA-2023-0016

CVSSv3 Range: 6.5

Issue Date: 2023-07-25

Updated On: 2023-07-25 (Initial Advisory)

CVE(s): CVE-2023-20891

Synopsis: VMware Tanzu Application Service for VMs and Isolation Segment updates address information disclosure vulnerability (CVE-2023-20891)

****1. Impacted Products****

  • VMware Tanzu Application Service for VMs
  • Isolation Segment

****2. Introduction****

VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.

****3. VMware Tanzu Application Service for VMs and Isolation Segment information disclosure vulnerability (CVE-2023-20891)****

The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs .VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.5.

A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.

To remediate CVE-2023-20891, apply the patches listed in the ‘Fixed Version’ column of the ‘Resolution Matrix’ found below.

All the impacted users of Vmware Tanzu Application Service for VMs and Isolation Segment are recommended to do CF API admin credential rotation as per our KB here.

Product

Version

Running On

CVE Identifier

CVSSv3

Severity

Fixed Version

Workarounds

Additional Documentation

VMware Tanzu Application Service for VMs

4.0.x

Any

CVE-2023-20891

6.5

moderate

4.0.5

None

None

VMware Tanzu Application Service for VMs

3.0.x

Any

CVE-2023-20891

6.5

moderate

3.0.14

None

None

VMware Tanzu Application Service for VMs

2.13.x

Any

CVE-2023-20891

6.5

moderate

2.13.24

None

None

VMware Tanzu Application Service for VMs

2.11.x

Any

CVE-2023-20891

6.5

moderate

2.11.42

None

None

Isolation Segment

4.0.x

Any

CVE-2023-20891

6.5

moderate

4.0.4

None

None

Isolation Segment

3.0.x

Any

CVE-2023-20891

6.5

moderate

3.0.13

None

None

Isolation Segment

2.13.x

Any

CVE-2023-20891

6.5

moderate

2.13.20

None

None

Isolation Segment

2.11.x

Any

CVE-2023-20891

6.5

moderate

2.11.35

None

None

****4. References****

****5. Change Log****

25 Jul 2023 : VMSA-2023-0016
Initial security advisory.

****6. Contact****

CVE: Latest News

CVE-2023-50976: Transactions API Authorization by oleiman · Pull Request #14969 · redpanda-data/redpanda
CVE-2023-6905
CVE-2023-6903
CVE-2023-6904
CVE-2023-3907