{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2023-014.pdf"
    },
    "title": "Critical Vulnerabilities in VMware Products",
    "serial_number": "2023-014",
    "publish_date": "23-02-2023 21:30:00",
    "description": "On February 20, 2023, the MISP project team released advisories regarding 2 critical SQL injection vulnerabilities in MISP Threat Intelligence and Sharing Platform. The team decided to follow a silent fix procedure, releasing several updates in November and December 2022, giving enough time to users to update their instances to a safe version.",
    "url_title": "2023-014",
    "content_markdown": "--- \ntitle: 'Critical Vulnerabilities in VMware Products'\nversion: '1.0'\nnumber: '2023-014'\noriginal_date: 'February 21, 2023'\ndate: 'February 23, 2023'\n---\n\n_History:_\n\n* _23/02/2023 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn February 21, 2023, VMware released several advisories regarding critical vulnerabilities affecting Carbon Black App Control and VMware vRealize tools. The first vulnerability is identified as `CVE-2023-20858` (CVSSv3 score of 9.1) and impacts several versions of Carbon Black App Control for Windows. The second vulnerability is identified as `CVE-2023-20855` (CVSSv3 score of 8.8) and impacts VMware vRealize tools and VMware Cloud Foundation.\n\n# Technical Details\n\n**CVE-2023-20858**:\n\nA malicious actor with privileged access to the App Control administration console may be able to use specially crafted input allowing access to the underlying server operating system. Injection flaws allow attackers to execute commands or code in the target app, and they could lead to a complete compromise of back-end systems and all clients that connect to the vulnerable application [1,2].\n\n**CVE-2023-20855**:\n\nA malicious actor, with non-administrative access to vRealize Orchestrator, may be able to use specially crafted input to bypass XML parsing restrictions leading to access to sensitive information or possible escalation of privileges [4].\n\n# Affected Products\n\nThe `CVE-2023-20858` impacts VMware Carbon Black App Control for Windows versions [1]:\n\n- VMware Carbon Black App Control for Windows versions 8.7.x;\n- VMware Carbon Black App Control for Windows versions 8.8.x;\n- VMware Carbon Black App Control for Windows versions 8.9.x.\n\nThe `CVE-2023-20855` impacts [4]:\n\n- VMware vRealize Orchestrator running on virtual appliances versions 8.x;\n- VMware vRealize Automation versions 8.x;\n- VMware Cloud Foundation version 4.x.\n\n# Recommendations\n\nCERT-EU recommends updating: \n\n- the VMware Carbon Black App Control to fixed versions accordingly [1]: \n    - 8.7.8;\n    - 8.8.6;\n    - 8.9.4.\n- the VMware vRealize Orchestrator and Automation to the fixed version 8.11.1 [4];\n- the VMware Cloud Foundation to the fixed version [4].\n\n# References\n\n[1] <https://www.vmware.com/security/advisories/VMSA-2023-0004.html>\n\n[2] <https://www.bleepingcomputer.com/news/security/vmware-warns-admins-of-critical-carbon-black-app-control-flaw/>\n\n[3] <https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-datasheet-app-control.pdf>\n\n[4] <https://www.vmware.com/security/advisories/VMSA-2023-0005.html>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>23/02/2023 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On February 21, 2023, VMware released several advisories regarding critical vulnerabilities affecting Carbon Black App Control and VMware vRealize tools. The first vulnerability is identified as <code>CVE-2023-20858</code> (CVSSv3 score of 9.1) and impacts several versions of Carbon Black App Control for Windows. The second vulnerability is identified as <code>CVE-2023-20855</code> (CVSSv3 score of 8.8) and impacts VMware vRealize tools and VMware Cloud Foundation.</p><h2 id=\"technical-details\">Technical Details</h2><p><strong>CVE-2023-20858</strong>:</p><p>A malicious actor with privileged access to the App Control administration console may be able to use specially crafted input allowing access to the underlying server operating system. Injection flaws allow attackers to execute commands or code in the target app, and they could lead to a complete compromise of back-end systems and all clients that connect to the vulnerable application [1,2].</p><p><strong>CVE-2023-20855</strong>:</p><p>A malicious actor, with non-administrative access to vRealize Orchestrator, may be able to use specially crafted input to bypass XML parsing restrictions leading to access to sensitive information or possible escalation of privileges [4].</p><h2 id=\"affected-products\">Affected Products</h2><p>The <code>CVE-2023-20858</code> impacts VMware Carbon Black App Control for Windows versions [1]:</p><ul><li>VMware Carbon Black App Control for Windows versions 8.7.x;</li><li>VMware Carbon Black App Control for Windows versions 8.8.x;</li><li>VMware Carbon Black App Control for Windows versions 8.9.x.</li></ul><p>The <code>CVE-2023-20855</code> impacts [4]:</p><ul><li>VMware vRealize Orchestrator running on virtual appliances versions 8.x;</li><li>VMware vRealize Automation versions 8.x;</li><li>VMware Cloud Foundation version 4.x.</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU recommends updating: </p><ul><li>the VMware Carbon Black App Control to fixed versions accordingly [1]: <ul><li>8.7.8;</li><li>8.8.6;</li><li>8.9.4.</li></ul></li><li>the VMware vRealize Orchestrator and Automation to the fixed version 8.11.1 [4];</li><li>the VMware Cloud Foundation to the fixed version [4].</li></ul><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.vmware.com/security/advisories/VMSA-2023-0004.html\">https://www.vmware.com/security/advisories/VMSA-2023-0004.html</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.bleepingcomputer.com/news/security/vmware-warns-admins-of-critical-carbon-black-app-control-flaw/\">https://www.bleepingcomputer.com/news/security/vmware-warns-admins-of-critical-carbon-black-app-control-flaw/</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-datasheet-app-control.pdf\">https://www.vmware.com/content/dam/digitalmarketing/vmware/en/pdf/docs/vmwcb-datasheet-app-control.pdf</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.vmware.com/security/advisories/VMSA-2023-0005.html\">https://www.vmware.com/security/advisories/VMSA-2023-0005.html</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}