Authorization bypass in VMware vRealize Log Insight

Published: 2018-11-14
Risk Low
Patch available YES
Number of vulnerabilities 1
CVE-ID CVE-2018-6980
Exploitation vector Network
Public exploit N/A
Vulnerable software
Aria Operations for Logs (formerly vRealize Log Insight)
Client/Desktop applications / Other client software

Vendor VMware, Inc

Security Bulletin

This security bulletin contains one low risk vulnerability.

1) Authorization bypass

EUVDB-ID: #VU15886

Risk: Low

CVSSv3.1: 6.3 [CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2018-6980

CWE-ID: CWE-285 - Improper Authorization

Exploit availability: No


The vulnerability allows a remote administrative attacker to bypass authorization on the target system.

The vulnerability exists due to improper authorization in the user registration method. An Admin attacker with view only permission can perform certain administrative functions not allowed to perform.


The vulnerability has been fixed in the versions 4.6.2, 4.7.1.

Vulnerable software versions

Aria Operations for Logs (formerly vRealize Log Insight): 4.6.0 - 4.7.0

External links

Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated privileged user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.