vulnerability
Red Hat: CVE-2023-20900: SAML token signature bypass (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
8 | (AV:A/AC:M/Au:N/C:C/I:C/A:C) | 2023-08-31 | 2023-09-20 | 2025-01-28 |
Severity
8
CVSS
(AV:A/AC:M/Au:N/C:C/I:C/A:C)
Published
2023-08-31
Added
2023-09-20
Modified
2025-01-28
Description
A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
Solution(s)
redhat-upgrade-open-vm-toolsredhat-upgrade-open-vm-tools-debuginforedhat-upgrade-open-vm-tools-debugsourceredhat-upgrade-open-vm-tools-desktopredhat-upgrade-open-vm-tools-desktop-debuginforedhat-upgrade-open-vm-tools-develredhat-upgrade-open-vm-tools-salt-minionredhat-upgrade-open-vm-tools-sdmpredhat-upgrade-open-vm-tools-sdmp-debuginforedhat-upgrade-open-vm-tools-testredhat-upgrade-open-vm-tools-test-debuginfo

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.