VMware fixed five vulnerabilities in Aria Operations product
Pierluigi Paganini
November 27, 2024
November 27, 2024
Virtualization giant VMware addressed multiple vulnerabilities in its Aria Operations product that can led to privilege escalation and XSS attacks.
VMware released security updates to address five vulnerabilities in its Aria Operations product. Aria Operations (formerly known as VMware vRealize Operations) is a comprehensive cloud management and operations platform developed by VMware. It is designed to provide IT administrators and cloud professionals with tools to optimize, manage, and troubleshoot their hybrid and multi-cloud environments.
The virtualization giant addressed the following vulnerabilities:
Here are the details from VMware’s VMSA-2024-0022 bulletin:
- Local privilege escalation vulnerability (CVE-2024-38830) (CVSS 7.8) – A local admin on VMware Aria Operations can exploit a vulnerability to escalate privileges to root.
- Local privilege escalation vulnerability (CVE-2024-38831) (CVSS 7.8) – A threat actor with local administrative privileges on VMware Aria Operations can exploit a properties file to execute malicious commands and gain root privileges.
- Stored cross-site scripting vulnerability (CVE-2024-38832) (CVSS 7.1) – A threat actor with editing access to views may be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations.
- Stored cross-site scripting vulnerability (CVE-2024-38833) (CVSS 6.8) – An attacker with access to edit email templates in VMware Aria Operations can inject scripts, causing stored cross-site scripting (XSS) vulnerabilities.
- Stored cross-site scripting vulnerability (CVE-2024-38834) (CVSS 6.5) – An attacker with cloud provider editing access in VMware Aria Operations can inject scripts, causing stored cross-site scripting (XSS) vulnerabilities.
Below is the response matrix published by VMware:
Product | Version | Running On | CVE | CVSSv3 | Severity | Fixed versions | Workaround | Additional Documents |
VMware Aria Operations | 8.x | Any | CVE-2024-38830, CVE-2024-38831, CVE-2024-38832,CVE-2024-38833, CVE-2024-38834 | 7.8 , 7.8, 7.1, 6.8, 6.5 | Important | 8.18.2 | None | None |
VMware Cloud Foundation (VMware Aria Operations) | 5.x | Any | CVE-2024-38830, CVE-2024-38831, CVE-2024-38832,CVE-2024-38833, CVE-2024-38834 | 7.8 , 7.8, 7.1, 6.8, 6.5 | Important | 8.18.2 | None | None |
VMware Cloud Foundation (VMware Aria Operations) | 4.x | Any | CVE-2024-38830, CVE-2024-38831, CVE-2024-38832,CVE-2024-38833, CVE-2024-38834 | 7.8 , 7.8, 7.1, 6.8, 6.5 | Important | 8.18.2 | None | None |
Follow me on Twitter: @securityaffairs and Facebook and Mastodon
Pierluigi Paganini
(SecurityAffairs – hacking, VMWARE)