Home SECURITY VMware Confirms Active Exploitation of CVE-2023-20887 Vulnerability in Aria Operations

VMware Confirms Active Exploitation of CVE-2023-20887 Vulnerability in Aria Operations

0
VMware Confirms Active Exploitation of CVE-2023-20887 Vulnerability in Aria Operations

[ad_1]

VMware Confirms Active Exploitation of CVE-2023-20887 Vulnerability in Aria Operations

The issue affects nine software versions: 6.2 through 6.10.

Company VMware reported that the critical vulnerability in her product Aria Operations for Networks (formerly known as vRealize Network Insight) has been heavily attacked by cybercriminals.

Vulnerability that received an ID CVE-2023-20887 allows an attacker with network access to perform an attack like command injection and perform remote code execution on a device with a vulnerable product.

The issue affects Aria Operations Networks version six, including 6.2, 6.3, 6.4, 6.5.1, 6.6, 6.7, 6.8, 6.9, and 6.10. Two weeks ago, on June 7, the company released patches for each vulnerable version.

However, according to VMware, as early as June 20, real attacks using this vulnerability were recorded. Details about the attackers are not yet known. “VMware confirms that CVE-2023-20887 has been exploited in the wild,” the company said in a statement.

According to the cyber intelligence organization Gray Noise, the attacks came from two different IP addresses from the Netherlands. Moreover, they began shortly after the researcher Sina Kheirha from Summoning Teamdiscovered and publicly reported the vulnerability by publishing a proof of concept (PoC) operation CVE-2023-20887 .

The speed with which various hacker groups use new vulnerabilities in their attacks is surprising and frightening. Therefore, organizations need to always be on the alert and follow the latest news in the field of cybersecurity.

Users of Aria Operations for Networks are advised to update to the latest version as soon as possible to avoid potential risks of malicious exploitation of the vulnerability.

[ad_2]

Source link

www.securitylab.ru

LEAVE A REPLY

Please enter your comment!
Please enter your name here