Just two days after VMware posted an CVSS 10.0- rated patch to VMware vCenter Server issued an advisory covering two additional vulnerabilities, this time in vRealize Log Insight (vRLI) version 8.0.0, 4.x.y.
The vulnerabilities, CVE-2020-3953, CVE-2020-3954, were issued respective CVSS scores of 8.4 (critical) and 6.1 (moderate). VMware recommends updating to version 8.1.0 which contains patches for these vulnerabilities.
CVE-2020-3953 is a cross site scripting (XSS) issue does not properly validate user input, resulting in XSS vulnerabilities. This can be exploited by an actor who has user-level permissions who would be able to add a malicious payload through the Log Insight UI. This malware would then be executed when the victim, who also would have user or admin-level permissions views the data in the UI. This could result in the target’s device being compromised.
Please register to continue.
Already registered? Log in.
Once you register, you'll receive:
The context and insight you need to stay abreast of the most important developments in cybersecurity. CISO and practitioner perspectives; strategy and tactics; solutions and innovation; policy and regulation.
Unlimited access to nearly 20 years of SC Media industry analysis and news-you-can-use.
SC Media’s essential morning briefing for cybersecurity professionals.
One-click access to our extensive program of virtual events, with convenient calendar reminders and ability to earn CISSP credits.