Skip to content

Commit

Permalink
20231115002-Mware-Security-Update-Cloud-Director-Appliance (#407)
Browse files Browse the repository at this point in the history
* 20231027001-Roundcube Webmail Persistent Cross-Site Scripting (XSS) Vulnerability

* 20231031001-VVMware-Tools-Multiple-Vulnerabilities

* 20231031001-VMware-Tools-Multiple-Vulnerabilities

* 20231106001-Cisco-Security-Advisories-for-Multiple-Products-vulnerability

* 20231106001-Cisco-Security-Advisories-for-Multiple-Products-vulnerability

* 20231109001-Service-Location-Protocol(SLP)-Denial-of-Service-Vulnerability

* 20231114001-SysAid-Server-Path-Traversal-Known-Exploited-vulnerability

* Update 20231109001-Service-Location-Protocol(SLP)-Denial-of-Service-Vulnerability.md

* Update 20231114001-SysAid-Server-Path-Traversal-Known-Exploited-vulnerability.md

* 20231115002-Mware-Security-Update-Cloud-Director-Appliance

* 20231115002-Mware-Security-Update-Cloud-Director-Appliance

---------

Co-authored-by: Joshua Hitchen (DGov) <[email protected]>
  • Loading branch information
TWangmo and DGovEnterprise authored Nov 15, 2023
1 parent 4d72357 commit 6544df0
Showing 1 changed file with 29 additions and 0 deletions.
Original file line number Diff line number Diff line change
@@ -0,0 +1,29 @@
# VMware Security Update for Cloud Director Appliance - 20231115002

## Overview

VMware has a critical severity range vulnerability in VMware Cloud Director Appliance, that contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from an older version.

## What is the vulnerability?

[**CVE-2023-34060**](https://nvd.nist.gov/vuln/detail/CVE-2023-34060) - CVSS v3 Base Score: ***9.8***

## What is vulnerable?

The vulnerability affects the following products:

- VMware Cloud Director Appliance (VCD Appliance) version 10.5 if upgraded from 10.4.x or below.

## What has been observed?

There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

## Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of *one month* (refer [Patch Management](../guidelines/patch-management.md)):

- [VMware Cloud Director 10.5 Workaround](https://kb.vmware.com/s/article/95534)

## Additional References

- [VMware Advisories](https://www.vmware.com/security/advisories/VMSA-2023-0026.html)

0 comments on commit 6544df0

Please sign in to comment.