Headline
CVE-2023-20891: VMSA-2023-0016
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
Advisory ID: VMSA-2023-0016
CVSSv3 Range: 6.5
Issue Date: 2023-07-25
Updated On: 2023-07-25 (Initial Advisory)
CVE(s): CVE-2023-20891
Synopsis: VMware Tanzu Application Service for VMs and Isolation Segment updates address information disclosure vulnerability (CVE-2023-20891)
****1. Impacted Products****
- VMware Tanzu Application Service for VMs
- Isolation Segment
****2. Introduction****
VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure which was privately reported to VMware. Patches are available to remediate this vulnerability in affected VMware products.
****3. VMware Tanzu Application Service for VMs and Isolation Segment information disclosure vulnerability (CVE-2023-20891)****
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs .VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 6.5.
A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
To remediate CVE-2023-20891, apply the patches listed in the ‘Fixed Version’ column of the ‘Resolution Matrix’ found below.
All the impacted users of Vmware Tanzu Application Service for VMs and Isolation Segment are recommended to do CF API admin credential rotation as per our KB here.
Product
Version
Running On
CVE Identifier
CVSSv3
Severity
Fixed Version
Workarounds
Additional Documentation
VMware Tanzu Application Service for VMs
4.0.x
Any
CVE-2023-20891
6.5
moderate
4.0.5
None
None
VMware Tanzu Application Service for VMs
3.0.x
Any
CVE-2023-20891
6.5
moderate
3.0.14
None
None
VMware Tanzu Application Service for VMs
2.13.x
Any
CVE-2023-20891
6.5
moderate
2.13.24
None
None
VMware Tanzu Application Service for VMs
2.11.x
Any
CVE-2023-20891
6.5
moderate
2.11.42
None
None
Isolation Segment
4.0.x
Any
CVE-2023-20891
6.5
moderate
4.0.4
None
None
Isolation Segment
3.0.x
Any
CVE-2023-20891
6.5
moderate
3.0.13
None
None
Isolation Segment
2.13.x
Any
CVE-2023-20891
6.5
moderate
2.13.20
None
None
Isolation Segment
2.11.x
Any
CVE-2023-20891
6.5
moderate
2.11.35
None
None
****4. References****
****5. Change Log****
25 Jul 2023 : VMSA-2023-0016
Initial security advisory.
****6. Contact****