MEDIUM · 6.5

CVE-2023-20891

The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A ma...

Vulnerability Description

The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs.

CVSS Score

6.5

MEDIUM

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
LOW
User Interaction
NONE
Scope
UNCHANGED
Confidentiality
HIGH
Integrity
NONE
Availability
NONE

Affected Products

VendorProductVersions
VmwareIsolation Segment>= 2.11.0, < 2.11.35
VmwareTanzu Application Service For Virtual Machines>= 2.11.0, < 2.11.42

Related Weaknesses (CWE)

References

FAQ

What is CVE-2023-20891?

CVE-2023-20891 is a vulnerability with a CVSS score of 6.5 (MEDIUM). The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A ma...

How severe is CVE-2023-20891?

CVE-2023-20891 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2023-20891?

Check the references section above for vendor advisories and patch information. Affected products include: Vmware Isolation Segment, Vmware Tanzu Application Service For Virtual Machines.