6.5
CVE-2023-20891
- EPSS 0.32%
- Published 26.07.2023 06:15:10
- Last modified 21.11.2024 07:41:45
- Source security@vmware.com
- Teams watchlist Login
- Open Login
The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.
Data is provided by the National Vulnerability Database (NVD)
VMware ≫ Isolation Segment Version >= 2.11.0 < 2.11.35
VMware ≫ Isolation Segment Version >= 2.13.0 < 2.13.20
VMware ≫ Isolation Segment Version >= 3.0.0 < 3.0.13
VMware ≫ Isolation Segment Version >= 4.0.0 < 4.0.4
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 2.11.0 < 2.11.42
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 2.13.0 < 2.13.24
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 3.0.0 < 3.0.14
VMware ≫ Tanzu Application Service For Virtual Machines Version >= 4.0.0 < 4.0.5
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
Type | Source | Score | Percentile |
---|---|---|---|
EPSS | FIRST.org | 0.32% | 0.542 |
Source | Base Score | Exploit Score | Impact Score | Vector string |
---|---|---|---|---|
nvd@nist.gov | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
security@vmware.com | 6.5 | 2.8 | 3.6 |
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
|
CWE-532 Insertion of Sensitive Information into Log File
The product writes sensitive information to a log file.