{"id":16837,"date":"2023-02-01T18:32:04","date_gmt":"2023-02-01T17:32:04","guid":{"rendered":"https:\/\/www.show.it\/vmware-confirms-exploit-code-released-for-critical-vrealize-logging-vulnerabilities\/"},"modified":"2023-02-01T18:32:04","modified_gmt":"2023-02-01T17:32:04","slug":"vmware-confirms-exploit-code-released-for-critical-vrealize-logging-vulnerabilities","status":"publish","type":"post","link":"https:\/\/www.show.it\/en\/vmware-confirms-exploit-code-released-for-critical-vrealize-logging-vulnerabilities\/","title":{"rendered":"VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities"},"content":{"rendered":"<p><strong>The urgency to patch a trio of dangerous security flaws in a VMware virtual appliance product escalated this week after exploit code was published on the internet.<\/strong><\/p>\n<p>VMware confirmed the publication of exploit code in an update to its VMSA-2023-0001 bulletin and called on customers using its VMware vRealize Log Insight product to implement mitigations as a matter of urgency.<\/p>\n<p>The <a href=\"https:\/\/www.securityweek.com\/vmware-plugs-critical-code-execution-flaws\/\">vulnerabilities<\/a>, tracked as CVE-2022-31706, CVE-2022-31704 and CVE-2022-31710, are rated critical with CVSS severity scores of 9.8 out of 10.<\/p>\n<p>The security defects affect users of its VMware vRealize Log Insight and could be exploited by an unauthenticated attacker to take full control of a target system.<\/p>\n<p>VMware described the flaws as directory traversal and broken access control issues with dangerous implications and warned that \u201can unauthenticated, malicious actor can inject files into the operating system of an impacted appliance which can result in remote code execution.\u201d<\/p>\n<p>The bulletin update follows the publication of a <a href=\"https:\/\/www.horizon3.ai\/vmware-vrealize-log-insight-vmsa-2023-0001-technical-deep-dive\/\">technical deep-dive<\/a> by automated penetration testing firm Horizon3.ai that included demo exploit code. The company also <a href=\"https:\/\/www.horizon3.ai\/vmware-vrealize-cve-2022-31706-iocs\/\">released IOCs<\/a> (indicators of compromise) to help defenders hunt for signs of compromise.<\/p>\n<p>VMware\u2019s VRealize Log Insight is a log collection and analytics virtual appliance used by administrators to collect, view, manage and analyze syslog data.<\/p>\n<p><strong>Related:<\/strong> <a href=\"https:\/\/www.securityweek.com\/vmware-plugs-critical-code-execution-flaws\/\">VMware Plugs Critical vRealize Code Execution Flaws<\/a><\/p>\n<p><strong>Related:<\/strong> <a href=\"https:\/\/www.securityweek.com\/vmware-patches-vm-escape-flaw-exploited-geekpwn-event\/\">VMware Patches VM Escape Flaw Exploited at Geekpwn Event<\/a><\/p>\n<p><strong>Related: <\/strong><a href=\"https:\/\/www.securityweek.com\/gaping-authentication-bypass-holes-vmware-workspace-one\/\">Gaping Authentication Bypass Holes in VMware Workspace One<\/a><\/p>\n<p><strong>Related: <\/strong><a href=\"https:\/\/www.securityweek.com\/vmware-confirms-workspace-one-exploits-wild\/\">VMware Confirms Workspace One Exploits in the Wild<\/a><\/p>\n<p>The post <a rel=\"nofollow\" href=\"https:\/\/www.securityweek.com\/vmware-confirms-exploit-code-released-for-critical-vrealize-logging-vulnerabilities\/\">VMware Confirms Exploit Code Released for Critical vRealize Logging Vulnerabilities<\/a> appeared first on <a rel=\"nofollow\" href=\"https:\/\/www.securityweek.com\/\">SecurityWeek<\/a>.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>The urgency to patch a trio of dangerous security flaws in a VMware virtual appliance product escalated this week after exploit code was published on the internet. VMware confirmed the publication of exploit code in an update to its VMSA-2023-0001 bulletin and called on customers using its VMware vRealize Log Insight product to implement mitigations [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":16838,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[23],"tags":[],"class_list":["post-16837","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerabilities"],"acf":[],"_links":{"self":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/16837","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/comments?post=16837"}],"version-history":[{"count":0,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/posts\/16837\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media\/16838"}],"wp:attachment":[{"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/media?parent=16837"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/categories?post=16837"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.show.it\/en\/wp-json\/wp\/v2\/tags?post=16837"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}