"PoC of VMware vRealize Log Insight Vulnerabilities Said to Launch RCE"

Researchers published a Proof-of-Concept (PoC) of a series of VMware vRealize Log Insight vulnerabilities to show that attackers could exploit the flaws to perform Remote Code Execution (RCE) as root. VMware recently provided patches and workarounds for the vRealize vulnerabilities after the Zero Day Initiative (ZDI) discovered and reported them late last summer. James Horseman, an exploit developer at Horizon3.ai, explained that the team chose to focus on the VMware log management Common Vulnerabilities and Exposures (CVEs) due to their high severity and low complexity. Two of the four vulnerabilities were classified as critical, with a 9.8 rating. According to Horseman, a high CVE rating signifies low complexity, implying that attackers can exploit the vulnerabilities more easily and quickly. The National Institute of Standards and Technology (NIST) identified one flaw as a directory traversal vulnerability. An unauthenticated actor can inject files into a vulnerable appliance's operating system, leading to RCE. NIST identified another flaw as an access control vulnerability in which an unauthenticated actor could remotely inject code into the sensitive files of an affected appliance, which could also result in RCE. This article continues to discuss Horizon3.ai releasing a PoC for vulnerabilities in VMware vRealize Log Insight that could launch RCE. 

SC Media reports "PoC of VMware vRealize Log Insight Vulnerabilities Said to Launch RCE"

Submitted by Anonymous on