Sponsored By

The exploit code was brought to VMware's attention by an anonymous researcher, in tandem with the Trend Micro Zero Day Initiative.

Dark Reading Staff

July 11, 2023

1 Min Read
a bunch of green code with red code inside the same of the inside of a lock.
Source: Elena11 via Shutterstock

A critical security vulnerability in the VMware Aria Operations for Logs analysis tool for cloud management — known as CVE-202-20864 — now has an exploit available that allows threat actors to run arbitrary code as root, no user interaction necessary.

The flaw was originally patched in April, along with several security updates for less severe vulnerabilities. Now, VMware asserts that waiting any longer to apply the fixes to VMware software should be a nonstarter.

It is strongly advised that users apply the patches to this vulnerability to prepare for any incoming attacks should they arise, especially given that VMware is one of cyberattackers' favorite targets when it comes to the cloud.

"To remediate CVE-2023-20864 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below," VMware stated in its advisory regarding the issue.

About the Author(s)

Dark Reading Staff

Dark Reading

Dark Reading is a leading cybersecurity media site.

Keep up with the latest cybersecurity threats, newly discovered vulnerabilities, data breach information, and emerging trends. Delivered daily or weekly right to your email inbox.

You May Also Like


More Insights