Security

Patches

Patch now: Critical VMware, Atlassian flaws found

You didn't have anything else to do this Tuesday, right?


VMware and Atlassian today disclosed critical vulnerabilities and, while neither appear to have been exploited by miscreants yet, admins should patch now to avoid disappointment.

First off, a pair of issues from Atlassian. Most serious is CVE-2023-22527, a template injection flaw that can allow unauthenticated remote code execution (RCE) attacks. It scored a perfect CVSS rating of 10 out of 10 and affects Confluence Data Center and Server 8 versions released before December 5, 2023 and 8.4.5, which no longer receives fixes. 

The solution: "immediately" patch each affected installation by updating to the latest available version, according to the vendor.

Atlassian also released fixes for a high-severity flaw was found in the FasterXML Jackson Databind code used in versions 8.20.0, 9.4.0, 9.5.0, and 9.6.0 of Jira Software Data Center and Server. The 7.5-rated bug, tracked as CVE-2020-25649, could allow XML external entity (XXE) attacks in which miscreants could mess with data integrity. 

So in addition to updating Confluence, it's also a good idea to upgrade to the latest version of Jira Software Data Center and Server, the collaboration biz advises.

Moving on to the critical VMware bug, CVE-2023-34063. This one is a missing access control problem in all versions of Aria Automation earlier of 8.16. Be aware that this infrastructure automation product may be included in VMware Cloud Foundation.

The bug earned a 9.9 CVSS rating, and VMware warns that successful exploitation can allow unauthorized access to remote organizations and workflows. Luckily this one also has a fix, so upgrade to VMware Aria Automation 8.16, and then apply the patch.

As the virtualization giant notes: "The only supported upgrade path after applying the patch is to version 8.16. VMware strongly recommends this version. If you upgrade to an intermediate version, the vulnerability will be reintroduced, requiring an additional round of patching."

VMware isn't aware of any reports of exploitation "as of now." But it's safe to assume that would-be attackers are already scanning for vulnerable installations, so make sure to apply the fix before the software vendor is forced to update its advisory. ®

Send us news
8 Comments

Broadcom has brought VMware down to earth and that’s welcome

But users aren’t optimistic it will land softly

Broadcom promised to reform VMware so it enables better hybrid clouds. Will it deliver?

It needs to – Virtzilla's customers, allies, and enemies are all pondering off-ramps and trying to lure unhappy users

VMware reveals how it will deliver Broadcom's unified hybrid cloud … sometime soon

Claims just two management consoles will emerge

SolarWinds left critical hardcoded credentials in its Web Help Desk product

Why go to the effort of backdooring code when devs will basically do it for you accidentally anyway

Microsoft hosts a security summit but no press, public allowed

CrowdStrike, other vendors, friendly govt reps…but not anyone who would tell you what happened

AT&T sues Broadcom for 'breaking' VMware support extension contract

Telco giant slams silicon-and-software shop for trying to bully it into buying software it doesn't want or need, at huge prices

Alleged Karakut ransomware scumbag charged in US

Plus: Microsoft issues workaround for dual-boot crashes; ARRL cops to ransom payment, and more

You probably want to patch this critical GitHub Enterprise Server bug now

Unless you're cool with an unauthorized criminal enjoying admin privileges to comb through your code

Security biz Verkada to pay $3M penalty under deal that also enforces infosec upgrade

Allowed access to 150K cameras, some in sensitive spots, but has been done for spamming

Public clouds are 'dirty' about VMware's on-prem push, says Broadcom CEO Hock Tan

Virtzilla's sales swing decisively to the Cloud Foundation bundle

Veeam debuts its Proxmox backup tool – and reveals outfit using it to quit VMware

More help for Nutanix, too

White House thinks it's time to fix the insecure glue of the internet: Yup, BGP

Better late than never