www.vmware.com
Open in
urlscan Pro
2a02:26f0:480:497::2ef
Public Scan
URL:
https://www.vmware.com/security/advisories/VMSA-2023-0023.html
Submission: On October 25 via api from BE — Scanned from DE
Submission: On October 25 via api from BE — Scanned from DE
Form analysis
3 forms found in the DOM//www.vmware.com/search.html
<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
<input type="text" name="q" id="ub-search" class="d-none" placeholder="Search" title="Search" aria-role="searchbox" role="searchbox">
<a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">
<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
</a>
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
//www.vmware.com/search.html
<form action="//www.vmware.com/search.html" id="globalsearch" class="wrapperSearch">
<a href="javascript:void(0);" tabindex="-1" class="search-icon ml-lg-3" name="nav_utility : Search">
</a>
<input type="text" name="q" id="ub-search" placeholder="Search" title="Search" role="searchbox">
<input type="hidden" name="num" value="20">
<input type="hidden" name="filter" value="0">
<input type="hidden" name="ie" value="UTF-8">
<input type="hidden" name="oe" value="UTF-8">
<input type="hidden" name="entqr" value="0">
<input type="hidden" name="start" value="0">
<input type="hidden" name="sort" value="">
<input type="hidden" name="tlen" value="200">
<input type="hidden" name="numgm" value="3">
<input type="hidden" name="cn" value="vmware">
<input type="hidden" name="cid" value="">
<input type="hidden" name="tid" value="">
<input type="hidden" name="getfields" value="*">
<input type="hidden" name="partialfields" value="">
<input type="hidden" name="requiredfields" value="">
<input type="hidden" name="place" value="top">
<input type="hidden" name="client" value="VMware_Site_1">
<input type="hidden" name="site" value="VMware_Site_1">
<input type="hidden" name="cc" value="en">
<input type="hidden" name="stype" value="main">
</form>
Name: securitysignup —
<form accept-charset="UNKNOWN" id="securitysignup" name="securitysignup" data-gtm-form-interact-id="0">
<label class="email-input-label" for="securityEmail">*Email</label>
<input id="securityEmail" name="email" size="25" type="text" data-gtm-form-interact-field-id="0">
<span class="subscriptionerrorMsg sa-validation-alerts" tabindex="0"></span>
<input name="email-button" class="sa-subscription-modal-button sa-subscription-submit-button" type="submit" onclick="s_objectID='content_advisories : : 0';" value="Submit">
</form>
Text Content
Skip to Promo Skip to main content Global Search US Store Login Cloud Services Console Customer Connect Partner Connect * Multi-Cloud Services * Products * Solutions * Partners * Resources GET STARTED Global Search Main Menu TODAY’S MULTI-CLOUD REALITY: CLOUD CHAOS 87% OF ENTERPRISES USE TWO OR MORE CLOUD ENVIRONMENTS TO RUN THEIR APPLICATIONS. MULTI-CLOUD ACCELERATES DIGITAL TRANSFORMATION, BUT ALSO INTRODUCES COMPLEXITY AND RISK, RESULTING IN A CHAOTIC REALITY FOR MANY ORGANIZATIONS. LEARN ABOUT MULTI-CLOUD CONQUER CLOUD CHAOS WITH VMWARE CROSS-CLOUD SERVICES VMware is addressing cloud chaos with our portfolio of multi-cloud services, VMware Cross-Cloud services, which enable you to build, run, manage, secure, and access applications consistently across cloud environments. With VMware Cross-Cloud services, you can address cloud chaos and shift to a cloud smart approach – one where you can choose the best environment for every application, without multiplying your complexity. LEARN HOW CROSS-CLOUD SERVICES CAN HELP Main Menu ANYWHERE WORKSPACE Access Any App on Any Device Securely Horizon Horizon Cloud Workspace ONE Workspace ONE UEM APP PLATFORM Build and Operate Cloud Native Apps Tanzu CLOUD & EDGE INFRASTRUCTURE Run Enterprise Apps Anywhere Cloud Foundation/Cloud Foundation+ SD-WAN/SASE Telco Cloud vSAN/vSAN+ vSphere/vSphere+ VMware Cloud VMware Cloud Disaster Recovery CLOUD MANAGEMENT Automate and Optimize Apps and Clouds VMware Aria CloudHealth Skyline DESKTOP HYPERVISOR Manage apps in a local virtualization sandbox Fusion for Mac Workstation Player Workstation Pro SECURITY & NETWORKING Connect and Secure Apps and Clouds Carbon Black Cloud Carbon Black Endpoint NSX/NSX+ NSX Advanced Load Balancer NSX Distributed Firewall RUN VMWARE ON ANY CLOUD. ANY ENVIRONMENT. ANYWHERE. ON PUBLIC & HYBRID CLOUDS Alibaba Cloud VMware Service Azure VMware Solution Google Cloud VMware Engine IBM Cloud for VMware Solutions Oracle Cloud VMware Solutions VMware Cloud on AWS VMware Cloud on AWS GovCloud (US) ON PRIVATE & LOCAL CLOUDS Dell EMC VxRail VMware Cloud on Equinix Metal VMware on AWS Outposts VMware Verified Cloud Providers SEE ALL PRODUCTS SEE PRICING SaaS (Subscription) product version available Main Menu SOLUTIONS ANYWHERE WORKSPACE ACCESS ANY APP ON ANY DEVICE SECURELY APP PLATFORM BUILD AND OPERATE CLOUD NATIVE APPS CLOUD INFRASTRUCTURE RUN ENTERPRISE APPS ANYWHERE CLOUD MANAGEMENT AUTOMATE AND OPTIMIZE APPS AND CLOUDS EDGE INFRASTRUCTURE ENABLE THE MULTI-CLOUD EDGE NETWORKING ENABLE CONNECTIVITY FOR APPS AND CLOUDS SECURITY SECURE APPS AND CLOUDS BY INDUSTRY Communications Service Providers Department of Defense Federal Government Financial Services Healthcare Providers State and Local Government VMWARE AI SOLUTIONS Accelerate and ensure the success of your generative AI initiatives with multi-cloud flexibility, choice, privacy and control. LEARN MORE SEE ALL SOLUTIONS SEE ALL INDUSTRIES Main Menu FOR CUSTOMERS Find a Cloud Provider Find a Partner VMware Marketplace Work with a Partner FOR PARTNERS Become a Cloud Provider Cloud Partner Navigator Get Cloud Verified Learning and Selling Resources Partner Connect Login Partner Executive Edge Technology Partner Hub Work with VMware WORKING TOGETHER WITH PARTNERS FOR CUSTOMER SUCCESS See how we work with a global partner to help companies prepare for multi-cloud. VIEW PARTNER STORY Main Menu TOOLS & TRAINING VMware Customer Connect VMware Trust Center Learning & Certification Tech Zone Product Downloads Product Trials Cloud Services Engagement Platform Hands-on Labs SERVICES Professional Services Customer Success SUPPORT VMware Customer Connect Support Offerings Skyline Support Customer Welcome Center MARKETPLACE Cloud Marketplace VMware Marketplace VIDEOS VMware Video Library VMware Explore Video Library BLOGS & COMMUNITIES Blogs Podcasts News & Stories Communities CUSTOMERS Customer Stories EVENTS VMware Explore SpringOne All Events & Webcasts SEE ALL RESOURCES Ellipsis VMware Security Solutions Advisories VMSA-2023-0023 Critical Advisory ID: VMSA-2023-0023 CVSSv3 Range: 4.3-9.8 Issue Date: 2023-10-25 Updated On: 2023-10-25 (Initial Advisory) CVE(s): CVE-2023-34048, CVE-2023-34056 Synopsis: VMware vCenter Server updates address out-of-bounds write and information disclosure vulnerabilities (CVE-2023-34048, CVE-2023-34056) RSS Feed Download PDF Download Text File Share this page on social media: Sign up for Security Advisories SIGN UP FOR SECURITY ADVISORIES Stay up to date on the latest VMware Security advisories and updates. Close *Email 1. IMPACTED PRODUCTS * VMware vCenter Server * VMware Cloud Foundation 2. INTRODUCTION An out-of-bounds write (CVE-2023-34048) and a partial information disclosure (CVE-2023-34056) in vCenter Server were responsibly reported to VMware. Updates are available to remediate these vulnerabilities in affected VMware products. 3A. VMWARE VCENTER SERVER OUT-OF-BOUNDS WRITE VULNERABILITY (CVE-2023-34048) Description vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Critical severity range with a maximum CVSSv3 base score of 9.8. Known Attack Vectors A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution. Resolution To remediate CVE-2023-34048 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments. Workarounds In-product workarounds were investigated, but were determined to not be viable. Additional Documentation A supplemental FAQ was created for additional clarification. Please see: https://via.vmw.com/vmsa-2023-0023-qna Notes * While VMware does not mention end-of-life products in VMware Security Advisories, due to the critical severity of this vulnerability and lack of workaround VMware has made a patch generally available for vCenter Server 6.7U3, 6.5U3, and VCF 3.x. For the same reasons, VMware has made additional patches available for vCenter Server 8.0U1. * Async vCenter Server patches for VCF 5.x and 4.x deployments have been made available. Please see KB88287 for more information. Acknowledgements VMware would like to thank Grigory Dorodnov of Trend Micro Zero Day Initiative for reporting this issue to us. 3B. VMWARE VCENTER SERVER PARTIAL INFORMATION DISCLOSURE VULNERABILITY (CVE-2023-34056) Description vCenter Server contains a partial information disclosure vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 4.3. Known Attack Vectors A malicious actor with non-administrative privileges to vCenter Server may leverage this issue to access unauthorized data. Resolution To remediate CVE-2023-34056 apply the updates listed in the 'Fixed Version' column of the 'Response Matrix' below to affected deployments. Workarounds None. Additional Documentation None. Acknowledgements VMware would like to thank Oleg Moshkov of Deiteriy Lab OÜ for reporting this issue to us. Response Matrix Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation VMware vCenter Server 8.0 Any CVE-2023-34048, CVE-2023-34056 9.8, 4.3 critical 8.0U2 None FAQ VMware vCenter Server 8.0 Any CVE-2023-34048 9.8 critical 8.0U1d None FAQ VMware vCenter Server 7.0 Any CVE-2023-34048, CVE-2023-34056 9.8, 4.3 critical 7.0U3o None FAQ VMware Cloud Foundation (VMware vCenter Server) 5.x, 4.x Any CVE-2023-34048, CVE-2023-34056 9.8, 4.3 critical KB88287 None FAQ 4. REFERENCES Fixed Version(s) and Release Notes: VMware vCenter Server 8.0U2 Downloads and Documentation: https://customerconnect.vmware.com/downloads/details?downloadGroup=VC80U2&productId=1345&rPId=110105 VMware vCenter Server 8.0U1d Downloads and Documentation: https://customerconnect.vmware.com/downloads/details?downloadGroup=VC80U1D&productId=1345&rPId=112378 VMware vCenter Server 7.0U3o Downloads and Documentation: https://customerconnect.vmware.com/downloads/details?downloadGroup=VC70U3O&productId=974&rPId=110262 Cloud Foundation 5.x/4.x https://kb.vmware.com/s/article/88287 Mitre CVE Dictionary Links https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34048 https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-34056 FIRST CVSSv3 Calculator CVE-2023-34048: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H CVE-2023-34056: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N 5. CHANGE LOG 2023-10-25 VMSA-2023-0023 Initial security advisory. 6. CONTACT E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2023 VMware Inc. All rights reserved. Company About Us Executive Leadership News & Stories Investor Relations Customer Stories Diversity, Equity & Inclusion Environment, Social & Governance AI at VMware Careers Blogs Communities Acquisitions Office Locations VMware Cloud Trust Center COVID-19 Resources Support VMware Customer Connect Support Policies Product Documentation Compatibility Guide Terms & Conditions California Transparency Act Statement Hands-on Labs & Trials Twitter YouTube Facebook LinkedIn Contact Sales -------------------------------------------------------------------------------- © 2023 VMware, Inc. Terms of Use Your California Privacy Rights Privacy Accessibility Trademarks Glossary Help Cookies Settings WE CARE ABOUT YOUR PRIVACY We use cookies to provide you with the best experience on our website, to improve usability and performance and thereby improve what we offer to you. Our website may also use third-party cookies to display advertising that is more relevant to you. By clicking on the “Accept All” button you agree to the storing of cookies on your device. If you close the cookie banner, only strictly necessary cookies will be stored on your device. If you want to know more about how we use cookies, please see our Cookie Policy. Cookies Settings Accept All Cookies COOKIE PREFERENCE CENTER * GENERAL INFORMATION ON COOKIES * STRICTLY NECESSARY * PERFORMANCE * FUNCTIONAL * ADVERTISING GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. STRICTLY NECESSARY Always Active Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookies Details PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookies Details FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookies Details ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookies Details Back Button COOKIE LIST Filter Button Consent Leg.Interest checkbox label label checkbox label label checkbox label label Clear checkbox label label Apply Cancel Confirm My Choices Reject All Allow All