As per sources, a critical level authentication bypass bug in 'VMware Aria Operations for Networks' (previously vRealize Network Insight) might enable remote attackers to circumvent SSH authentication and access private endpoints. VMware Aria provides a management and surveillance package for virtualized networks and hybrid clouds that includes IT automation, log management, analytics creation, network exposure, security and capacity scheduling, and full-scope operations oversight. According to VMware's alert, the flaw was identified by ProjectDiscovery Research experts as CVE-2023-34039 and has a severity of 9.8, marking it "critical." It affects every Aria 6.x branch version. In accordance to the researchers, an authentication bypass issue exists owing to the deficiency of unique cryptographic key generation, and an attacker with network access to Aria Operations for Networks might overcome SSH authentication to obtain access to the Aria Operations for Networks CLI. Furthermore, exploiting CVE-2023-34039 may result in data exfiltration or modification via the product's command-line interface. This access, depending on the settings, can cause network interruption, configuration alteration, malware deployment, and lateral movement. Because the vendor has not given any workarounds or mitigation suggestions, the only option to address the serious issue is to update to version 6.11 or apply the KB94152 patch to prior editions. VMware said CVE-2023-20890 is a second high-severity (CVSS v3: 7.2) bug resolved by the same patch. This arbitrary file write vulnerability could enable an attacker with administrative access to the victim to execute remote code. In addition, because VMware software is employed in huge enterprises with substantial assets, hackers are eager to target major security flaws in the VMware products. As a result, any delay in deploying the KB94152 patch or updating to Aria version 6.11 puts the network in danger of hacker attack.
SantaStealer is an emerging malware-as-a-service (MaaS) infostealer currently advertised across Telegram channels and underground cybercrime forums. Promoted as a stealth, memory-r...
Security researchers have uncovered a newly active Android banking malware known as FrogBlight, which is being used in targeted mobile attack campaigns primarily aimed at users in ...
Shannon is a fully autonomous AI-driven penetration testing tool designed to discover, validate, and exploit web application vulnerabilities without human intervention. Unlike trad...