Virtualization giant VMware addressed multiple vulnerabilities in its Aria Operations product that can led to privilege escalation and XSS attacks.
VMware released security updates to address five vulnerabilities in its Aria Operations product. Aria Operations (formerly known as VMware vRealize Operations) is a comprehensive cloud management and operations platform developed by VMware. It is designed to provide IT administrators and cloud professionals with tools to optimize, manage, and troubleshoot their hybrid and multi-cloud environments.
The virtualization giant addressed the following vulnerabilities:
Local privilege escalation vulnerability (CVE-2024-38830)(CVSS 7.8) – A local admin on VMware Aria Operations can exploit a vulnerability to escalate privileges to root.
Local privilege escalation vulnerability (CVE-2024-38831) (CVSS 7.8) – A threat actor with local administrative privileges on VMware Aria Operations can exploit a properties file to execute malicious commands and gain root privileges.
Stored cross-site scripting vulnerability (CVE-2024-38832)(CVSS 7.1) – A threat actor with editing access to views may be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations.
Stored cross-site scripting vulnerability (CVE-2024-38833) (CVSS 6.8) – An attacker with access to edit email templates in VMware Aria Operations can inject scripts, causing stored cross-site scripting (XSS) vulnerabilities.
Stored cross-site scripting vulnerability (CVE-2024-38834) (CVSS 6.5) – An attacker with cloud provider editing access in VMware Aria Operations can inject scripts, causing stored cross-site scripting (XSS) vulnerabilities.