Skip to main content

Critical VMWARE vuln VMSA-2023-0023


BertrandFR
Forum|alt.badge.img+8

Hello,

In case anyone missed the news of the day:

CVE-2023-34048, updates are available. Don’t wait too long if you’re exposed. I didn’t find a public POC yet, i think it won’t be long now.

VMSA-2023-0023 (vmware.com)

8 comments

coolsport00
Forum|alt.badge.img+20
  • Veeam Legend
  • 4153 comments
  • October 25, 2023

Thanks for sharing!


TylerJurgens
Forum|alt.badge.img+7
  • Influencer
  • 161 comments
  • October 25, 2023

Appreciate the heads up!


Chris.Childerhose
Forum|alt.badge.img+21
  • Veeam Legend, Veeam Vanguard
  • 8512 comments
  • October 25, 2023

Saw this in the Security emails that I get for VMware but good to inform the community.  Thanks for sharing.


Scott
Forum|alt.badge.img+9
  • Veeam Legend
  • 1003 comments
  • October 25, 2023

Got the email from VMware this AM. Most of us don’t allow public IP’s to hit our vCenter’s hopefully 🙂, but I’ll be doing the update when I can. 


TylerJurgens
Forum|alt.badge.img+7
  • Influencer
  • 161 comments
  • October 25, 2023

Firewalls just get in the way. If you put your vCenter and your hosts on a public IP, you’ll be able to access them anywhere!


Scott
Forum|alt.badge.img+9
  • Veeam Legend
  • 1003 comments
  • October 25, 2023
TylerJurgens wrote:

Firewalls just get in the way. If you put your vCenter and your hosts on a public IP, you’ll be able to access them anywhere!

Better yet, forward 3399 to your home PC and enable RDP while you are away.  It’s a great way for “Remote access” and cheaper than a VPN. Put that cost savings for a .com domain name to simplify needing an IP address even. 

 

*disclaimer* If you don’t sense the sarcasm, please do not do this.

 


vAdmin
Forum|alt.badge.img+2
  • Influencer
  • 168 comments
  • October 26, 2023

Yes, thank you for the sharing on this high scoring vulnerabilities.

The update must be done via the manual mount of the ISO not the VAMI.

 

https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3o-release-notes/index.html


Iams3le
Forum|alt.badge.img+11
  • Veeam Legend
  • 1394 comments
  • November 2, 2023
BertrandFR wrote:

Hello,

In case anyone missed the news of the day:

CVE-2023-34048, updates are available. Don’t wait too long if you’re exposed. I didn’t find a public POC yet, i think it won’t be long now.

VMSA-2023-0023 (vmware.com)

Yes, VMware claims they have not found any evidence of the CVE-2023-34048 being exploited.