
=====================================================================

                             CERT-Renater

                  Note d'Information No. 2023/VULN042

_____________________________________________________________________

DATE                : 01/02/2023

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware vRealize Operations (vROps)
                             versions 8.6.x prior to KB90672.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2023-0002.html
_____________________________________________________________________


Moderate

Advisory ID:
VMSA-2023-0002

CVSSv3 Range:
6.5

Issue Date:
2023-01-31

Updated On:
2023-01-31 (Initial Advisory)

CVE(s):
CVE-2023-20856


Synopsis:
VMware vRealize Operations (vROps) update addresses a CSRF bypass
vulnerability (CVE-2023-20856)


1. Impacted Products

     VMware vRealize Operations (vROps)


2. Introduction

A vulnerability in VMware vRealize Operations (vROps) was privately
reported to VMware. A patch is available to address this
vulnerability in the affected VMware product.

3. VMware vRealize Operations (vROps) CSRF bypass vulnerability
(CVE-2023-20856)


Description

vRealize Operations (vROps) contains a CSRF bypass vulnerability.
VMware has evaluated the severity of this issue to be in the Moderate
severity range with a maximum CVSSv3 base score of 6.5.

Known Attack Vectors

A malicious user could execute actions on the platform on behalf of
the authenticated victim user.


Resolution

To remediate CVE-2023-20856 apply the updates listed in the 'Fixed
Version' column of the 'Response Matrix' below.


Workarounds

None.


Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank thiscodecc of MoyunSec TopBreaker
Labs and Bing Liu of MoyunSec for reporting this issue to us.

Response Matrix

Product     Version     Running On      CVE Identifier 	CVSSv3 	
Severity   Fixed Version     Workarounds     Additional Documentation

VMware vRealize Operations (vROps)    8.10     Any     CVE-2023-20856
N/A    N/A     Unaffected     N/A    N/A

VMware vRealize Operations (vROps)    8.6.x    Any     CVE-2023-20856
6.5    moderate    KB90672     None     NA


4. References

Fixed Version(s) and Release Notes:

VMware vRealize Operations (vROps) 8.6.4 HF9 KB90672: 
https://kb.vmware.com/s/article/90672

Downloads and Documentation:

https://customerconnect.vmware.com/en/downloads/info/slug/infrastructure_operations_management/vmware_vrealize_operations/8_6

https://docs.vmware.com/en/vRealize-Operations/8.6.4/rn/vrealize-operations-864-release-notes/index.html

Mitre CVE Dictionary Links:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20856

FIRST CVSSv3 Calculator:

CVE-2023-20856: 
https://www.first.org/cvss/calculator/3.0#CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:U/C:H/I:N/A:N


5. Change Log

2023-01-31 VMSA-2023-0002
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce


This Security Advisory is posted to the following lists:

security-announce@lists.vmware.com
bugtraq@securityfocus.com
fulldisclosure@seclists.org


E-mail
security@vmware.com

PGP key
https://kb.vmware.com/kb/1055

VMware Security Advisories
http://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

VMware Security & Compliance Blog
https://blogs.vmware.com/security

Twitter
https://twitter.com/VMwareSRC


=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================


