6.5
CVE-2023-20891
- EPSS 0.24%
- Veröffentlicht 26.07.2023 06:15:10
- Zuletzt bearbeitet 21.11.2024 07:41:45
- Quelle security@vmware.com
- CVE-Watchlists
- Unerledigt
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
VMware ≫ Isolation Segment Version >= 2.11.0 < 2.11.35
VMware ≫ Isolation Segment Version >= 2.13.0 < 2.13.20
VMware ≫ Isolation Segment Version >= 3.0.0 < 3.0.13
VMware ≫ Isolation Segment Version >= 4.0.0 < 4.0.4
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 2.11.0 < 2.11.42
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 2.13.0 < 2.13.24
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 3.0.0 < 3.0.14
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 4.0.0 < 4.0.5
| Typ | Quelle | Score | Percentile |
|---|---|---|---|
| EPSS | FIRST.org | 0.24% | 0.475 |
| Quelle | Base Score | Exploit Score | Impact Score | Vector String |
|---|---|---|---|---|
| nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
| security@vmware.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.