Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2023-34060

Severity
9.8CRITICAL
EPSS
0.1%
top 79.47%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedNov 14
Latest updateMar 12

Description

VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from an older version. On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console) . This bypass is not present on port 443 (VCD provider and tenant login). On a new installation of VMware

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:HExploitability: 3.9 | Impact: 5.9

Affected Packages2 packages

CVEListV5vmware_cloud_director_appliance_(vcd_appliance)10.5 if upgraded from 10.4.x or below.

🔴Vulnerability Details

2
GHSA
GHSA-w4pv-p6xf-qc53: VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 102023-11-14
CVEList
CVE-2023-34060: VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 102023-11-14

💥Exploits & PoCs

1
Exploit-DB
VMware Cloud Director 10.5 - Bypass identity verification2024-03-12

📋Vendor Advisories

1
VMware
VMware Cloud Director Appliance contains an authentication bypass vulnerability (CVE-2023-34060).2023-11-14

🕵️Threat Intelligence

1
Bleepingcomputer
VMware fixes critical Cloud Director auth bypass unpatched for 2 weeks2023-12-01
CVE-2023-34060 (CRITICAL CVSS 9.8) | VMware Cloud Director Appliance con | cvebase.io