CVE-2023-34039
CRITICAL
Published 2023-08-29T17:36:18.899Z
Actions:
CVSS Score
V3.1
9.8
/10
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Base Score Metrics
Exploitability: N/A
Impact: N/A
EPSS Score
v2023.03.01
0.959
probability
of exploitation in the wild
There is a 95.9% chance that this vulnerability will be exploited in the wild within the next 30 days.
Updated: 2025-01-25
Exploit Probability
Percentile: 0.996
Higher than 99.6% of all CVEs
Attack Vector Metrics
Impact Metrics
Description
Aria Operations for Networks contains an Authentication Bypass vulnerability due to a lack of unique cryptographic key generation. A malicious actor with network access to Aria Operations for Networks could bypass SSH authentication to gain access to the Aria Operations for Networks CLI.
Available Exploits
VMWare Aria Operations - Remote Code Execution
VMWare Aria Operations for Networks (vRealize Network Insight) Static SSH key RCE (CVE-2023-34039) Version: All versions from 6.0 to 6.10
ID: CVE-2023-34039
Author: tarunKoyalwar
Critical
References:
- https://github.com/sinsinology/CVE-2023-34039.git
- https://nvd.nist.gov/vuln/detail/CVE-2023-34039
- http://packetstormsecurity.com/files/174452/VMWare-Aria-Operations-For-Networks-Remote-Code-Execution.html
- http://packetstormsecurity.com/files/175320/VMWare-Aria-Operations-For-Networks-SSH-Private-Key-Exposure.html
- https://www.vmware.com/security/advisories/VMSA-2023-0018.html
Related News
No news articles found for this CVE.
References
Published: 2023-08-29T17:36:18.899Z
Last Modified: 2025-02-13T16:55:14.048Z
Copied to clipboard!