Patches are available for Carbon Black App Control’s critical vulnerability.
ESOF VMDR provides remediation measures for a critical security vulnerability affecting the Carbon Black App Control Product of VMware. Also, it can detect the vulnerability in the Carbon Black App product by giving the ESOF score based on the risks.
Update about the Vulnerability
A severe vulnerability (CVE-2023-20858) in App Control versions 8.7.x, 8.8.x, and 8.9.x was tracked on Tuesday. The exposure has a high CVSS score of 9.1 out of 10, indicating that it is a critical issue that needs to be addressed as soon as possible.
The vulnerability is described as an injection vulnerability, which means an attacker could inject malicious code or commands into the application, leading to unauthorized access or other security breaches. This type of vulnerability is hazardous because it allows attackers to bypass security measures and access sensitive data in the organization’s system.
The vulnerability was discovered and reported by security researcher Jari Jääskelä. Therefore, users of App Control need to take this vulnerability seriously and apply any available patches or updates as soon as possible to mitigate the risk of exploitation.
The company said, “The App Control administration console may be vulnerable to malicious actors who use specially crafted input to gain access to the underlying server operating system.”
VMware has identified a critical vulnerability in one of its products that cannot be addressed through any available workarounds. As a result, customers using the affected product will have only one option to update to specific versions, namely 8.7.8, 8.8.6, or 8.9.4, to mitigate the potential risks associated with the vulnerability.
For users using this product, it is essential to take this advisory seriously and apply the recommended updates as soon as possible to avoid any potential security risks. Failure to do so could leave their systems vulnerable to exploitation by attackers.
Besides, it is worth noting that the same researcher, Jääskelä, was credited with discovering two other critical vulnerabilities in the same product, which VMware resolved in March 2022((CVE-2022-22951 and CVE-2022-22952, CVSS scores: 9.1). This highlights the importance of ongoing vulnerability management and the need for companies to work closely with the security research community to identify and address potential security issues promptly.
Additionally, the company has fixed a vulnerability in XML External Entity (XXE) for vRealize Orchestrator, vRealize Automation, and Cloud Foundation (CVE-2023-20855, CVSS score: 8.8).
VMware said, “The malicious actor may be able to access sensitive information or escalate privileges by using specially crafted input if given non-administrative access to vRealize Orchestrator.”
Detecting vulnerabilities with ESOF VMDR
TAC Security Research team with ESOF VMDR detects the risks and vulnerabilities in real-time across the complete IT stack by calculating the cyber Risk score. The product(ESOF VMDR) discovers, evaluates, categorizes, and responds to vulnerabilities(CVE-2023-20858).
VMDR detection mechanism and payload consignment, there is no space for false positives in this approach.
With its threat intelligence feature, ESOF VMDR detects vulnerable assets, gives a cyber risk score(enhancing an enterprise’s security posture), and provides auto-prioritization and auto-remediation. Other than this, it also does the schedule scanning of your complete system on the web, mobile, SCR, and Infra. It segregates the vulnerabilities having high risks of affecting our system.
Our new ESOF Prediction feature predicts the number of vulnerabilities in the upcoming month. You can check out our ESOF Prediction solution brief to learn more about it.
As cyber threats evolve, we need to evolve as well.
To know more about the ESOF VMDR, Download the Datasheet Now!