VMware warned of five moderate-to-important severity flaws in Aria Operations for Networks - CVE-2024-22237

VMware warned of five moderate-to-important severity flaws in Aria Operations for Networks – CVE-2024-22237

VMware Aria Operations for Networks - CVE-2024-22237
VMware Aria Operations for Networks

CVE-2024-22237: Uncovering a High-Risk Local Privilege Escalation Vulnerability in Aria Operations for Networks

Within the realm of Aria Operations for Networks, a critical vulnerability emerges with CVE-2024-22237, paving the way for local privilege escalation. This vulnerability opens the door for a console user with access to Aria Operations for Networks to exploit and attain root access to the system, posing a significant security risk.

Evaluated using the CVSS v3.1 framework, this vulnerability carries a substantial base score of 7.80 (HIGH). Here’s a breakdown of the associated metrics:

  • Access Vector (AV): Local
  • Access Complexity (AC): Low
  • Privileges Required (PR): Low
  • User Interaction (UI): None
  • Impact on Confidentiality (C): High
  • Integrity impact (I): High
  • Impact on Availability (A): High

CVE-2024-22238: Uncovering a Cross-Site Scripting Vulnerability in Aria Operations for Networks

CVE-2024-22238 has cast its shadow on Aria Operations for Networks, revealing a noteworthy cross-site scripting (XSS) vulnerability. This vulnerability arises from inadequate sanitization of user profile input, allowing a malicious actor with administrator privileges to inject malevolent code into user profile configurations.

Assessed using the CVSS v3.1 framework, this vulnerability carries a base score of 6.40 (MEDIUM). Let’s delve into the associated metrics:

  • Access Vector (AV): Network
  • Access Complexity (AC): Low
  • Privileges Required (PR): High
  • User Interaction (UI): Required
  • Impact on Confidentiality (C): High
  • Integrity impact (I): Low
  • Impact on Availability (A): High

CVE-2024-22239: Unveiling a Local Privilege Escalation Vulnerability in Aria Operations for Networks

The spotlight falls on Aria Operations for Networks with the disclosure of CVE-2024-22239, exposing a significant local privilege escalation vulnerability. Within the realms of Aria Operations for Networks, a console user possessing access can exploit this vulnerability to escalate privileges, gaining regular shell access.

Assessed using the CVSS v3.1 framework, this vulnerability carries a base score of 5.30 (MEDIUM). Let’s delve into the associated metrics:

  • Access Vector (AV): Local
  • Access Complexity (AC): Low
  • Privileges Required (PR): Low
  • User Interaction (UI): None
  • Impact on Confidentiality (C): Low
  • Integrity impact(I): Low
  • Impact on Availability (A): Low

CVE-2024-22240: Unveiling a Medium-Risk Local File Read Vulnerability in Aria Operations for Networks

Within the realm of Aria Operations for Networks, CVE-2024-22240 presents a local file read vulnerability. This vulnerability exposes the potential for a malicious actor with administrator privileges to access sensitive information, raising concerns about the confidentiality of data.

Evaluated using the CVSS v3.1 framework, this vulnerability carries a moderate base score of 4.9. Here’s a breakdown of the associated metrics:

  • Access Vector (AV): Local
  • Access Complexity (AC): Low
  • Privileges Required (PR): Low
  • User Interaction (UI): None
  • Impact on Confidentiality (C): Low
  • Integrity impact (I): Low
  • Impact on Availability (A): Low

CVE-2024-22241: Uncovering a Medium-Risk Cross-Site Scripting Vulnerability in Aria Operations for Networks

The landscape of Aria Operations for Networks is marred by CVE-2024-22241, a cross-site scripting vulnerability. This flaw opens the door for a malicious actor endowed with administrator privileges to inject malevolent code into the login banner, potentially seizing control of the user account.

Assessed through the CVSS v3.1 framework, this vulnerability carries a moderate base score of 4.30. Below are the detailed metrics associated with this discovery:

  • Access Vector (AV): Network-based
  • Access Complexity (AC): Low
  • Privileges Required (PR): High
  • User Interaction (UI): Required
  • Impact on Confidentiality (C): Low
  • Integrity impact (I): Low
  • Impact on Availability (A): Low

Understanding the intricacies of CVE-2024-22237, CVE-2024-22238, CVE-2024-22239, CVE-2024-22240 and CVE-2024-22241 is crucial for administrators, empowering them to fortify defenses against potential exploits and mitigate the risks posed by this medium-risk cross-site scripting vulnerability.

Addressing Security Vulnerabilities CVE-2024-22237, CVE-2024-22238, CVE-2024-22239, CVE-2024-22240 and CVE-2024-22241 in VMware Aria Operations for Networks (Formerly vRealize Network Insight) Version 6.12.0 (96450)

To mitigate the risks, all users of VMware Aria Operations for Networks version 6.x are being recommended to upgrade to version 6.12.0.

Vulnerabilities section

Related Posts