Language:
https://www.vmware.com/security/advisories/VMSA-2023-0018.html
Severity: Critical
ID: 180411
File Name: vmware_aria_operations_for_networks_VMSA-2023-0018.nasl
Version: 1.3
Type: remote
Family: CGI abuses
Published: 8/31/2023
Updated: 10/25/2023
Supported Sensors: Nessus
Risk Factor: High
Score: 7.4
Risk Factor: Critical
Base Score: 10
Temporal Score: 8.3
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS Score Source: CVE-2023-34039
Risk Factor: Critical
Base Score: 9.8
Temporal Score: 9.1
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
CPE: cpe:/a:vmware:vrealize_network_insight, x-cpe:/a:vmware:aria_operations_for_networks
Required KB Items: installed_sw/VMware Aria Operations for Networks
Exploit Available: true
Exploit Ease: Exploits are available
Patch Publication Date: 7/29/2023
Vulnerability Publication Date: 7/29/2023
Metasploit (VMWare Aria Operations for Networks (vRealize Network Insight) SSH Private Key Exposure)
CVE: CVE-2023-20890, CVE-2023-34039