Risk | Medium |
Patch available | YES |
Number of vulnerabilities | 3 |
CVE-ID | CVE-2023-23914 CVE-2023-23915 CVE-2023-23916 |
CWE-ID | CWE-319 CWE-770 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software Subscribe |
Platform Automation Toolkit Other software / Other software solutions |
Vendor | VMware, Inc |
Security Bulletin
This security bulletin contains information about 3 vulnerabilities.
EUVDB-ID: #VU72335
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-23914
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to state issues when handling multiple requests, which results in ignoring HSTS support. A remote attacker can perform MitM attack. MitigationInstall update from vendor's website.
Vulnerable software versionsPlatform Automation Toolkit: before 5.1.1
http://tanzu.vmware.com/security/usn-5891-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU72336
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-23915
CWE-ID:
CWE-319 - Cleartext Transmission of Sensitive Information
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform MitM attack.
The vulnerability exists due to state issues when handling multiple transfers in parallel, which results in ignoring HSTS support. A remote attacker can perform MitM attack. MitigationInstall update from vendor's website.
Vulnerable software versionsPlatform Automation Toolkit: before 5.1.1
http://tanzu.vmware.com/security/usn-5891-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?
EUVDB-ID: #VU72337
Risk: Medium
CVSSv3.1:
CVE-ID: CVE-2023-23916
CWE-ID:
CWE-770 - Allocation of Resources Without Limits or Throttling
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to perform a denial of service (DoS) attack.
The vulnerability exists due to incorrect implementation of the "chained" HTTP compression algorithms, where the number of links in the decompression chain was limited for each header instead of the entire request. A remote attacker can send a specially crafted compressed HTTP request with numerous headers and perform a denial of service (DoS) attack.
Install update from vendor's website.
Vulnerable software versionsPlatform Automation Toolkit: before 5.1.1
http://tanzu.vmware.com/security/usn-5891-1
Q & A
Can this vulnerability be exploited remotely?
Is there known malware, which exploits this vulnerability?