Threat actors are at it again. VMware has updated a previously issued security advisory to alert customers about the active exploitation of a critical remote code execution (RCE) vulnerability, tracked as CVE-2023-20887. This vulnerability is located within VMware Aria Operations for Networks (formerly known as vRealize Network Insight). Read on to learn more about this critical vulnerability.
VMware Aria Operations for Networks is a widely used network analytics tool that helps administrators optimize network performance and manage VMware and Kubernetes deployments.
What makes this vulnerability concerning is that threat actors can exploit the flaw using low-complexity attacks that do not require user interaction or authentication. This means successfully exploiting the vulnerability is a lot easier, and could enable a remote attacker to execute arbitrary commands on the underlying operating system as the root user.
VMware first patched the security vulnerability on June 15. However, it’s important to note that workarounds are not available to mitigate this vulnerability, making immediate patching the only option.
Nuspire’s threat hunting operations remain on high alert for any indications of the VMware vulnerability being exploited within client environments. Nuspire is not affected by this vulnerability.
Due to the severity and active exploitation of this vulnerability, organizations are strongly advised to:
This situation highlights the critical importance of maintaining updated software to ensure the highest possible level of security against potential threats.