Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2025-22219 (GCVE-0-2025-22219)
Vulnerability from cvelistv5 – Published: 2025-01-30 15:26 – Updated: 2025-03-13 18:03
VLAI?
EPSS
Title
VMware Aria Operations for Logs stored cross-site scripting vulnerability (CVE-2025-22219)
Summary
VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability. A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin user.
Severity ?
6.8 (Medium)
CWE
- CWE-79 - Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting')
Assigner
References
1 reference
Impacted products
1 product
| Vendor | Product | Version | |
|---|---|---|---|
| VMware | VMware Aria Operations for Logs |
Affected:
8.x , < 8.18.3
(release)
|
Date Public ?
2025-01-30 14:00
{
"containers": {
"adp": [
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2025-22219",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-30T16:40:57.756199Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-79",
"description": "CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-03-13T18:03:28.501Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"defaultStatus": "unaffected",
"platforms": [
"any"
],
"product": "VMware Aria Operations for Logs",
"vendor": "VMware",
"versions": [
{
"lessThan": "8.18.3",
"status": "affected",
"version": "8.x",
"versionType": "release"
}
]
}
],
"datePublic": "2025-01-30T14:00:00.000Z",
"descriptions": [
{
"lang": "en",
"supportingMedia": [
{
"base64": false,
"type": "text/html",
"value": "\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eVMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u0026nbsp;\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003eA malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e\u0026nbsp;user\u003c/span\u003e\u003cspan style=\"background-color: rgb(255, 255, 255);\"\u003e.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e"
}
],
"value": "VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user."
}
],
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"format": "CVSS",
"scenarios": [
{
"lang": "en",
"value": "GENERAL"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-01-30T15:26:16.027Z",
"orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"shortName": "vmware"
},
"references": [
{
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329"
}
],
"source": {
"discovery": "UNKNOWN"
},
"title": "VMware Aria Operations for Logs stored cross-site scripting vulnerability (CVE-2025-22219)",
"x_generator": {
"engine": "Vulnogram 0.2.0"
}
}
},
"cveMetadata": {
"assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"assignerShortName": "vmware",
"cveId": "CVE-2025-22219",
"datePublished": "2025-01-30T15:26:16.027Z",
"dateReserved": "2025-01-02T04:29:30.444Z",
"dateUpdated": "2025-03-13T18:03:28.501Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"epss": {
"cve": "CVE-2025-22219",
"date": "2026-05-22",
"epss": "0.00211",
"percentile": "0.43547"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2025-22219\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2025-01-30T16:15:31.013\",\"lastModified\":\"2025-05-14T16:46:17.393\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user.\"},{\"lang\":\"es\",\"value\":\"VMware Aria Operations for Logs contiene una vulnerabilidad Cross-Site Scripting Almacenado. Un actor malintencionado con privilegios no administrativos podr\u00eda inyectar un script malicioso que pueda realizar operaciones Cross-Site Scripting Almacenado como usuario administrador.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\",\"baseScore\":6.8,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"HIGH\",\"userInteraction\":\"REQUIRED\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":0.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H\",\"baseScore\":9.0,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":2.3,\"impactScore\":6.0}]},\"weaknesses\":[{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"8.0\",\"versionEndExcluding\":\"8.18.3\",\"matchCriteriaId\":\"7883672C-8E78-4378-9EAB-42A656006A72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndIncluding\":\"5.2\",\"matchCriteriaId\":\"BC8A0BB4-A21B-4914-8F4B-37D300A4BBB9\"}]}]}],\"references\":[{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329\",\"source\":\"security@vmware.com\",\"tags\":[\"Vendor Advisory\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2025-22219\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-30T16:40:57.756199Z\"}}}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-79\", \"description\": \"CWE-79 Improper Neutralization of Input During Web Page Generation (\u0027Cross-site Scripting\u0027)\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-02-12T19:45:03.592Z\"}}], \"cna\": {\"title\": \"VMware Aria Operations for Logs stored cross-site scripting vulnerability (CVE-2025-22219)\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 6.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"MEDIUM\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"REQUIRED\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"HIGH\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"VMware\", \"product\": \"VMware Aria Operations for Logs\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.x\", \"lessThan\": \"8.18.3\", \"versionType\": \"release\"}], \"platforms\": [\"any\"], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2025-01-30T14:00:00.000Z\", \"references\": [{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\\u00a0user.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eVMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u0026nbsp;\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003eA malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e\u0026nbsp;user\u003c/span\u003e\u003cspan style=\\\"background-color: rgb(255, 255, 255);\\\"\u003e.\u003c/span\u003e\u003c/span\u003e\u003cbr\u003e\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2025-01-30T15:26:16.027Z\"}}}",
"cveMetadata": "{\"cveId\": \"CVE-2025-22219\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-13T18:03:28.501Z\", \"dateReserved\": \"2025-01-02T04:29:30.444Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2025-01-30T15:26:16.027Z\", \"assignerShortName\": \"vmware\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
BDU:2025-01355
Vulnerability from fstec - Published: 30.01.2025
VLAI Severity ?
Title
Уязвимость инструмента для анализа сетевых журналов VMware Aria Operations for Logs, существующая из-за непринятия мер по защите структуры веб-страницы, позволяющая нарушителю повысить свои привилегии и выполнить произвольный код
Description
Уязвимость инструмента для анализа сетевых журналов VMware Aria Operations for Logs связана с небезопасным управлением привилегиями. Эксплуатация уязвимости может позволить нарушителю, действующему удалённо, выполнить определенные операции в контексте пользователя-администратора
Severity ?
Vendor
VMware Inc.
Software Name
VMware Cloud Foundation, VMware Aria Operations for Logs
Software Version
до KB92148 (VMware Cloud Foundation), от 8 до 8.18.3 (VMware Aria Operations for Logs)
Possible Mitigations
Использование рекомендаций производителя:
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329
Reference
https://nvd.nist.gov/vuln/detail/CVE-2025-22219
https://www.cybersecurity-help.cz/vdb/SB2025013104
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329
CWE
CWE-269
{
"CVSS 2.0": "AV:N/AC:L/Au:S/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"CVSS 4.0": "AV:N/AC:L/AT:N/PR:L/UI:P/VC:N/VI:N/VA:N/SC:H/SI:H/SA:N",
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "VMware Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e KB92148 (VMware Cloud Foundation), \u043e\u0442 8 \u0434\u043e 8.18.3 (VMware Aria Operations for Logs)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u044f:\nhttps://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "30.01.2025",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "11.02.2025",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "11.02.2025",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2025-01355",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2025-22219",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "VMware Cloud Foundation, VMware Aria Operations for Logs",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0434\u043b\u044f \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 VMware Aria Operations for Logs, \u0441\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u044e\u0449\u0430\u044f \u0438\u0437-\u0437\u0430 \u043d\u0435\u043f\u0440\u0438\u043d\u044f\u0442\u0438\u044f \u043c\u0435\u0440 \u043f\u043e \u0437\u0430\u0449\u0438\u0442\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u044b \u0432\u0435\u0431-\u0441\u0442\u0440\u0430\u043d\u0438\u0446\u044b, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u043f\u043e\u0432\u044b\u0441\u0438\u0442\u044c \u0441\u0432\u043e\u0438 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u0438 \u0438 \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u041d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u043e\u0435 \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438 (CWE-269)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0438\u043d\u0441\u0442\u0440\u0443\u043c\u0435\u043d\u0442\u0430 \u0434\u043b\u044f \u0430\u043d\u0430\u043b\u0438\u0437\u0430 \u0441\u0435\u0442\u0435\u0432\u044b\u0445 \u0436\u0443\u0440\u043d\u0430\u043b\u043e\u0432 VMware Aria Operations for Logs \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u043d\u0435\u0431\u0435\u0437\u043e\u043f\u0430\u0441\u043d\u044b\u043c \u0443\u043f\u0440\u0430\u0432\u043b\u0435\u043d\u0438\u0435\u043c \u043f\u0440\u0438\u0432\u0438\u043b\u0435\u0433\u0438\u044f\u043c\u0438. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e, \u0434\u0435\u0439\u0441\u0442\u0432\u0443\u044e\u0449\u0435\u043c\u0443 \u0443\u0434\u0430\u043b\u0451\u043d\u043d\u043e, \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043e\u043f\u0440\u0435\u0434\u0435\u043b\u0435\u043d\u043d\u044b\u0435 \u043e\u043f\u0435\u0440\u0430\u0446\u0438\u0438 \u0432 \u043a\u043e\u043d\u0442\u0435\u043a\u0441\u0442\u0435 \u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u0442\u0435\u043b\u044f-\u0430\u0434\u043c\u0438\u043d\u0438\u0441\u0442\u0440\u0430\u0442\u043e\u0440\u0430",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430\u043d\u043d\u044b\u0435 \u0443\u0442\u043e\u0447\u043d\u044f\u044e\u0442\u0441\u044f",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u0418\u043d\u044a\u0435\u043a\u0446\u0438\u044f",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://nvd.nist.gov/vuln/detail/CVE-2025-22219\nhttps://www.cybersecurity-help.cz/vdb/SB2025013104\nhttps://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-269",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0412\u044b\u0441\u043e\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,8)\n\u0421\u0440\u0435\u0434\u043d\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u043e\u0446\u0435\u043d\u043a\u0430 CVSS 4.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 6,3)"
}
CERTFR-2025-AVI-0085
Vulnerability from certfr_avis - Published: 2025-01-31 - Updated: 2025-01-31
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une élévation de privilèges, une atteinte à la confidentialité des données et une injection de code indirecte à distance (XSS).
Solutions
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Impacted products
| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | Aria Operations | VMware Aria Operations versions 8.x antérieures à 8.18.3 | ||
| VMware | Cloud Foundation | VMware Cloud Foundation versions 4.x et 5.x sans le correctif KB92148 | ||
| VMware | Aria Operations | VMware Aria Operations for logs versions 8.x antérieures à 8.18.3 |
References
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "VMware Aria Operations versions 8.x ant\u00e9rieures \u00e0 8.18.3",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Cloud Foundation versions 4.x et 5.x sans le correctif KB92148",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Aria Operations for logs versions 8.x ant\u00e9rieures \u00e0 8.18.3",
"product": {
"name": "Aria Operations",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": "",
"content": "## Solutions\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des correctifs (cf. section Documentation).",
"cves": [
{
"name": "CVE-2025-22219",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22219"
},
{
"name": "CVE-2025-22218",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22218"
},
{
"name": "CVE-2025-22220",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22220"
},
{
"name": "CVE-2025-22222",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22222"
},
{
"name": "CVE-2025-22221",
"url": "https://www.cve.org/CVERecord?id=CVE-2025-22221"
}
],
"initial_release_date": "2025-01-31T00:00:00",
"last_revision_date": "2025-01-31T00:00:00",
"links": [],
"reference": "CERTFR-2025-AVI-0085",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2025-01-31T00:00:00.000000"
}
],
"risks": [
{
"description": "Injection de code indirecte \u00e0 distance (XSS)"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits VMware. Elles permettent \u00e0 un attaquant de provoquer une \u00e9l\u00e9vation de privil\u00e8ges, une atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es et une injection de code indirecte \u00e0 distance (XSS).",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": "2025-01-30",
"title": "Bulletin de s\u00e9curit\u00e9 VMware 25329",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329"
}
]
}
FKIE_CVE-2025-22219
Vulnerability from fkie_nvd - Published: 2025-01-30 16:15 - Updated: 2025-05-14 16:46
Severity ?
6.8 (Medium) - CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
9.0 (Critical) - CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H
Summary
VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability. A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin user.
References
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| vmware | aria_operations_for_logs | * | |
| vmware | cloud_foundation | * |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7883672C-8E78-4378-9EAB-42A656006A72",
"versionEndExcluding": "8.18.3",
"versionStartIncluding": "8.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "BC8A0BB4-A21B-4914-8F4B-37D300A4BBB9",
"versionEndIncluding": "5.2",
"versionStartIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user."
},
{
"lang": "es",
"value": "VMware Aria Operations for Logs contiene una vulnerabilidad Cross-Site Scripting Almacenado. Un actor malintencionado con privilegios no administrativos podr\u00eda inyectar un script malicioso que pueda realizar operaciones Cross-Site Scripting Almacenado como usuario administrador."
}
],
"id": "CVE-2025-22219",
"lastModified": "2025-05-14T16:46:17.393",
"metrics": {
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "HIGH",
"scope": "UNCHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 0.9,
"impactScore": 5.9,
"source": "security@vmware.com",
"type": "Secondary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.0,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "LOW",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 2.3,
"impactScore": 6.0,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2025-01-30T16:15:31.013",
"references": [
{
"source": "security@vmware.com",
"tags": [
"Vendor Advisory"
],
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329"
}
],
"sourceIdentifier": "security@vmware.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
GHSA-J5GV-MWMR-PPP5
Vulnerability from github – Published: 2025-01-30 18:32 – Updated: 2025-05-14 18:30
VLAI?
Details
VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability. A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin user.
Severity ?
6.8 (Medium)
{
"affected": [],
"aliases": [
"CVE-2025-22219"
],
"database_specific": {
"cwe_ids": [
"CWE-79"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2025-01-30T16:15:31Z",
"severity": "MODERATE"
},
"details": "VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability.\u00a0A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin\u00a0user.",
"id": "GHSA-j5gv-mwmr-ppp5",
"modified": "2025-05-14T18:30:44Z",
"published": "2025-01-30T18:32:07Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2025-22219"
},
{
"type": "WEB",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
NCSC-2025-0037
Vulnerability from csaf_ncscnl - Published: 2025-01-31 12:25 - Updated: 2025-01-31 12:25Summary
Kwetsbaarheden verholpen in VMware Aria Operations
Notes
The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:
NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.
NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.
This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings.
Feiten: VMware heeft kwetsbaarheden verholpen in VMware Aria Operations.
Interpretaties: De kwetsbaarheden omvatten een informatielek dat kwaadwillenden met View Only Admin-rechten in staat stelt om mogelijk de inloggegevens van geïntegreerde VMware-producten te lezen. Daarnaast is er een opgeslagen cross-site scripting-kwetsbaarheid die niet-administratieve gebruikers in staat stelt om kwaadaardige scripts in te voegen, wat kan leiden tot ongeautoriseerde toegang en acties. Een privilege-escalatiekwetsbaarheid stelt kwaadwillenden met niet-administratieve rechten in staat om operaties uit te voeren als een admin-gebruiker. Bovendien kan een andere opgeslagen cross-site scripting-kwetsbaarheid door een administrator worden misbruikt tijdens een verwijderactie, wat de browser van het slachtoffer kan beïnvloeden. Tot slot kan een informatielek kwaadwillenden met niet-administratieve rechten in staat stellen om inloggegevens voor een uitgaande plugin te verkrijgen, mits zij een geldig service credential ID kennen.
Oplossingen: VMware heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.
Kans: medium
Schade: high
CWE-200: Exposure of Sensitive Information to an Unauthorized Actor
8.5 (High)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
aria_operations
vmware
|
cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.0:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.1:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.2:*:*:*:*:*:*:*
|
— | |
|
cloud_foundation
vmware
|
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— |
6.8 (Medium)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
aria_operations
vmware
|
cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.0:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.1:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.2:*:*:*:*:*:*:*
|
— | |
|
cloud_foundation
vmware
|
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— |
4.3 (Medium)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
aria_operations
vmware
|
cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.0:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.1:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.2:*:*:*:*:*:*:*
|
— | |
|
cloud_foundation
vmware
|
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— |
5.2 (Medium)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
aria_operations
vmware
|
cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.0:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.1:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.2:*:*:*:*:*:*:*
|
— | |
|
cloud_foundation
vmware
|
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— |
7.7 (High)
Affected products
Known affected
8 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
aria_operations
vmware
|
cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.0:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.1:*:*:*:*:*:*:*
|
— | |
|
aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:aria_operations_for_logs:8.18.2:*:*:*:*:*:*:*
|
— | |
|
cloud_foundation
vmware
|
cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations:*:*:*:*:*:*:*:*
|
— | |
|
vmware_aria_operations_for_logs
vmware
|
cpe:2.3:a:vmware:vmware_aria_operations_for_logs:*:*:*:*:*:*:*:*
|
— |
References
6 references
{
"document": {
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE"
}
},
"lang": "nl",
"notes": [
{
"category": "legal_disclaimer",
"text": "The Netherlands Cyber Security Center (henceforth: NCSC-NL) maintains this page to enhance access to its information and security advisories. The use of this security advisory is subject to the following terms and conditions:\n\n NCSC-NL makes every reasonable effort to ensure that the content of this page is kept up to date, and that it is accurate and complete. Nevertheless, NCSC-NL cannot entirely rule out the possibility of errors, and therefore cannot give any warranty in respect of its completeness, accuracy or continuous keeping up-to-date. The information contained in this security advisory is intended solely for the purpose of providing general information to professional users. No rights can be derived from the information provided therein.\n\n NCSC-NL and the Kingdom of the Netherlands assume no legal liability or responsibility for any damage resulting from either the use or inability of use of this security advisory. This includes damage resulting from the inaccuracy of incompleteness of the information contained in the advisory.\n This security advisory is subject to Dutch law. All disputes related to or arising from the use of this advisory will be submitted to the competent court in The Hague. This choice of means also applies to the court in summary proceedings."
},
{
"category": "description",
"text": "VMware heeft kwetsbaarheden verholpen in VMware Aria Operations.",
"title": "Feiten"
},
{
"category": "description",
"text": "De kwetsbaarheden omvatten een informatielek dat kwaadwillenden met View Only Admin-rechten in staat stelt om mogelijk de inloggegevens van ge\u00efntegreerde VMware-producten te lezen. Daarnaast is er een opgeslagen cross-site scripting-kwetsbaarheid die niet-administratieve gebruikers in staat stelt om kwaadaardige scripts in te voegen, wat kan leiden tot ongeautoriseerde toegang en acties. Een privilege-escalatiekwetsbaarheid stelt kwaadwillenden met niet-administratieve rechten in staat om operaties uit te voeren als een admin-gebruiker. Bovendien kan een andere opgeslagen cross-site scripting-kwetsbaarheid door een administrator worden misbruikt tijdens een verwijderactie, wat de browser van het slachtoffer kan be\u00efnvloeden. Tot slot kan een informatielek kwaadwillenden met niet-administratieve rechten in staat stellen om inloggegevens voor een uitgaande plugin te verkrijgen, mits zij een geldig service credential ID kennen.",
"title": "Interpretaties"
},
{
"category": "description",
"text": "VMware heeft updates uitgebracht om de kwetsbaarheden te verhelpen. Zie bijgevoegde referenties voor meer informatie.",
"title": "Oplossingen"
},
{
"category": "general",
"text": "medium",
"title": "Kans"
},
{
"category": "general",
"text": "high",
"title": "Schade"
},
{
"category": "general",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"publisher": {
"category": "coordinator",
"contact_details": "cert@ncsc.nl",
"name": "Nationaal Cyber Security Centrum",
"namespace": "https://www.ncsc.nl/"
},
"references": [
{
"category": "external",
"summary": "Source - broadcom",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329"
}
],
"title": "Kwetsbaarheden verholpen in VMware Aria Operations",
"tracking": {
"current_release_date": "2025-01-31T12:25:21.454904Z",
"id": "NCSC-2025-0037",
"initial_release_date": "2025-01-31T12:25:21.454904Z",
"revision_history": [
{
"date": "2025-01-31T12:25:21.454904Z",
"number": "0",
"summary": "Initiele versie"
}
],
"status": "final",
"version": "1.0.0"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "aria_operations",
"product": {
"name": "aria_operations",
"product_id": "CSAFPID-152933",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:aria_operations:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "aria_operations_for_logs",
"product": {
"name": "aria_operations_for_logs",
"product_id": "CSAFPID-187460",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:aria_operations_for_logs:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "aria_operations_for_logs",
"product": {
"name": "aria_operations_for_logs",
"product_id": "CSAFPID-1755437",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:aria_operations_for_logs:8.18.0:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "aria_operations_for_logs",
"product": {
"name": "aria_operations_for_logs",
"product_id": "CSAFPID-1755438",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:aria_operations_for_logs:8.18.1:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "aria_operations_for_logs",
"product": {
"name": "aria_operations_for_logs",
"product_id": "CSAFPID-1755439",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:aria_operations_for_logs:8.18.2:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "cloud_foundation",
"product": {
"name": "cloud_foundation",
"product_id": "CSAFPID-342703",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "vmware_aria_operations",
"product": {
"name": "vmware_aria_operations",
"product_id": "CSAFPID-1730948",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:vmware_aria_operations:*:*:*:*:*:*:*:*"
}
}
},
{
"category": "product_name",
"name": "vmware_aria_operations_for_logs",
"product": {
"name": "vmware_aria_operations_for_logs",
"product_id": "CSAFPID-1755693",
"product_identification_helper": {
"cpe": "cpe:2.3:a:vmware:vmware_aria_operations_for_logs:*:*:*:*:*:*:*:*"
}
}
}
],
"category": "vendor",
"name": "vmware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22218",
"cwe": {
"id": "CWE-200",
"name": "Exposure of Sensitive Information to an Unauthorized Actor"
},
"notes": [
{
"category": "other",
"text": "Exposure of Sensitive Information to an Unauthorized Actor",
"title": "CWE-200"
}
],
"product_status": {
"known_affected": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22218",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22218.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 8.5,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
}
],
"title": "CVE-2025-22218"
},
{
"cve": "CVE-2025-22219",
"product_status": {
"known_affected": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22219",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22219.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 6.8,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"products": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
}
],
"title": "CVE-2025-22219"
},
{
"cve": "CVE-2025-22220",
"product_status": {
"known_affected": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22220",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22220.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 4.3,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
}
],
"title": "CVE-2025-22220"
},
{
"cve": "CVE-2025-22221",
"product_status": {
"known_affected": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22221",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22221.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 5.2,
"baseSeverity": "MEDIUM",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:L/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
}
],
"title": "CVE-2025-22221"
},
{
"cve": "CVE-2025-22222",
"product_status": {
"known_affected": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
},
"references": [
{
"category": "self",
"summary": "CVE-2025-22222",
"url": "https://api.ncsc.nl/velma/v1/vulnerabilities/2025/CVE-2025-22222.json"
}
],
"scores": [
{
"cvss_v3": {
"baseScore": 7.7,
"baseSeverity": "HIGH",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:N",
"version": "3.1"
},
"products": [
"CSAFPID-152933",
"CSAFPID-187460",
"CSAFPID-1755437",
"CSAFPID-1755438",
"CSAFPID-1755439",
"CSAFPID-342703",
"CSAFPID-1730948",
"CSAFPID-1755693"
]
}
],
"title": "CVE-2025-22222"
}
]
}
WID-SEC-W-2025-0228
Vulnerability from csaf_certbund - Published: 2025-01-30 23:00 - Updated: 2025-05-25 22:00Summary
VMware Aria Operations, VMware Aria Operations for Logs und VMware Cloud Foundation:: Mehrere Schwachstellen
Severity
Hoch
Notes
Das BSI ist als Anbieter für die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch dafür verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgfältig im Einzelfall zu prüfen.
Produktbeschreibung: VMware Aria Operations for Logs (ehemals vRealize Log Insight) ist ein Protokollanalysetool.
VMware Aria Operations bietet eine einheitliche Plattform für das IT-Betriebsmanagement in Private-, Hybrid- und Multi-Cloud-Umgebungen.
VMware Cloud Foundation ist eine Hybrid Cloud-Plattform für VM-Management und Container-Orchestrierung.
Angriff: Ein entfernter authentisierter Angreifer kann mehrere Schwachstellen in VMware Aria Operations for Logs, VMware Aria Operations und VMware Cloud Foundation ausnutzen, um Informationen preiszugeben, erhöhte Berechtigungen zu erlangen und einen Cross-Site-Scripting-Angriff durchzuführen.
Betroffene Betriebssysteme: - Sonstiges
- UNIX
- Windows
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation <KB92148
VMware / Cloud Foundation
|
<KB92148 | ||
|
VMware Aria Operations for Logs <8.18.3
VMware / Aria Operations for Logs
|
<8.18.3 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation <KB92148
VMware / Cloud Foundation
|
<KB92148 | ||
|
VMware Aria Operations for Logs <8.18.3
VMware / Aria Operations for Logs
|
<8.18.3 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation <KB92148
VMware / Cloud Foundation
|
<KB92148 | ||
|
VMware Aria Operations for Logs <8.18.3
VMware / Aria Operations for Logs
|
<8.18.3 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation <KB92148
VMware / Cloud Foundation
|
<KB92148 | ||
|
VMware Aria Operations for Logs <8.18.3
VMware / Aria Operations for Logs
|
<8.18.3 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— |
Affected products
Known affected
3 products
| Product | Identifier | Version | Remediation |
|---|---|---|---|
|
VMware Cloud Foundation <KB92148
VMware / Cloud Foundation
|
<KB92148 | ||
|
VMware Aria Operations <8.18.3
VMware / Aria Operations
|
<8.18.3 | ||
|
Google Cloud Platform
Google
|
cpe:/a:google:cloud_platform:-
|
— |
References
4 references
{
"document": {
"aggregate_severity": {
"text": "hoch"
},
"category": "csaf_base",
"csaf_version": "2.0",
"distribution": {
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "de-DE",
"notes": [
{
"category": "legal_disclaimer",
"text": "Das BSI ist als Anbieter f\u00fcr die eigenen, zur Nutzung bereitgestellten Inhalte nach den allgemeinen Gesetzen verantwortlich. Nutzerinnen und Nutzer sind jedoch daf\u00fcr verantwortlich, die Verwendung und/oder die Umsetzung der mit den Inhalten bereitgestellten Informationen sorgf\u00e4ltig im Einzelfall zu pr\u00fcfen."
},
{
"category": "description",
"text": "VMware Aria Operations for Logs (ehemals vRealize Log Insight) ist ein Protokollanalysetool.\r\nVMware Aria Operations bietet eine einheitliche Plattform f\u00fcr das IT-Betriebsmanagement in Private-, Hybrid- und Multi-Cloud-Umgebungen.\r\nVMware Cloud Foundation ist eine Hybrid Cloud-Plattform f\u00fcr VM-Management und Container-Orchestrierung.",
"title": "Produktbeschreibung"
},
{
"category": "summary",
"text": "Ein entfernter authentisierter Angreifer kann mehrere Schwachstellen in VMware Aria Operations for Logs, VMware Aria Operations und VMware Cloud Foundation ausnutzen, um Informationen preiszugeben, erh\u00f6hte Berechtigungen zu erlangen und einen Cross-Site-Scripting-Angriff durchzuf\u00fchren.",
"title": "Angriff"
},
{
"category": "general",
"text": "- Sonstiges\n- UNIX\n- Windows",
"title": "Betroffene Betriebssysteme"
}
],
"publisher": {
"category": "other",
"contact_details": "csaf-provider@cert-bund.de",
"name": "Bundesamt f\u00fcr Sicherheit in der Informationstechnik",
"namespace": "https://www.bsi.bund.de"
},
"references": [
{
"category": "self",
"summary": "WID-SEC-W-2025-0228 - CSAF Version",
"url": "https://wid.cert-bund.de/.well-known/csaf/white/2025/wid-sec-w-2025-0228.json"
},
{
"category": "self",
"summary": "WID-SEC-2025-0228 - Portal Version",
"url": "https://wid.cert-bund.de/portal/wid/securityadvisory?name=WID-SEC-2025-0228"
},
{
"category": "external",
"summary": "VMware Security Advisory VMSA-2025-0003 vom 2025-01-30",
"url": "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25329"
},
{
"category": "external",
"summary": "Google Cloud Platform Security Bulletin GCP-2025-028 vom 2025-05-23",
"url": "https://cloud.google.com/support/bulletins#gcp-2025-028"
}
],
"source_lang": "en-US",
"title": "VMware Aria Operations, VMware Aria Operations for Logs und VMware Cloud Foundation:: Mehrere Schwachstellen",
"tracking": {
"current_release_date": "2025-05-25T22:00:00.000+00:00",
"generator": {
"date": "2025-05-26T06:55:57.963+00:00",
"engine": {
"name": "BSI-WID",
"version": "1.3.12"
}
},
"id": "WID-SEC-W-2025-0228",
"initial_release_date": "2025-01-30T23:00:00.000+00:00",
"revision_history": [
{
"date": "2025-01-30T23:00:00.000+00:00",
"number": "1",
"summary": "Initiale Fassung"
},
{
"date": "2025-05-25T22:00:00.000+00:00",
"number": "2",
"summary": "Neue Updates von Google aufgenommen"
}
],
"status": "final",
"version": "2"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Google Cloud Platform",
"product": {
"name": "Google Cloud Platform",
"product_id": "393401",
"product_identification_helper": {
"cpe": "cpe:/a:google:cloud_platform:-"
}
}
}
],
"category": "vendor",
"name": "Google"
},
{
"branches": [
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.18.3",
"product": {
"name": "VMware Aria Operations \u003c8.18.3",
"product_id": "T040724"
}
},
{
"category": "product_version",
"name": "8.18.3",
"product": {
"name": "VMware Aria Operations 8.18.3",
"product_id": "T040724-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:aria_operations:8.18.3"
}
}
}
],
"category": "product_name",
"name": "Aria Operations"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003c8.18.3",
"product": {
"name": "VMware Aria Operations for Logs \u003c8.18.3",
"product_id": "T040723"
}
},
{
"category": "product_version",
"name": "8.18.3",
"product": {
"name": "VMware Aria Operations for Logs 8.18.3",
"product_id": "T040723-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:aria_operations_for_logs:8.18.3"
}
}
}
],
"category": "product_name",
"name": "Aria Operations for Logs"
},
{
"branches": [
{
"category": "product_version_range",
"name": "\u003cKB92148",
"product": {
"name": "VMware Cloud Foundation \u003cKB92148",
"product_id": "T040725"
}
},
{
"category": "product_version",
"name": "KB92148",
"product": {
"name": "VMware Cloud Foundation KB92148",
"product_id": "T040725-fixed",
"product_identification_helper": {
"cpe": "cpe:/a:vmware:cloud_foundation:kb92148"
}
}
}
],
"category": "product_name",
"name": "Cloud Foundation"
}
],
"category": "vendor",
"name": "VMware"
}
]
},
"vulnerabilities": [
{
"cve": "CVE-2025-22218",
"product_status": {
"known_affected": [
"T040725",
"T040723",
"393401"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2025-22218"
},
{
"cve": "CVE-2025-22219",
"product_status": {
"known_affected": [
"T040725",
"T040723",
"393401"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2025-22219"
},
{
"cve": "CVE-2025-22220",
"product_status": {
"known_affected": [
"T040725",
"T040723",
"393401"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2025-22220"
},
{
"cve": "CVE-2025-22221",
"product_status": {
"known_affected": [
"T040725",
"T040723",
"393401"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2025-22221"
},
{
"cve": "CVE-2025-22222",
"product_status": {
"known_affected": [
"T040725",
"T040724",
"393401"
]
},
"release_date": "2025-01-30T23:00:00.000+00:00",
"title": "CVE-2025-22222"
}
]
}
Loading…
Trend slope:
-
(linear fit over daily sighting counts)
Show additional events:
Loading…
Experimental. This forecast is provided for visualization only and may change without notice. Do not use it for operational decisions.
Forecast uses a logistic model when the trend is rising, or an exponential decay model when the trend is falling. Fitted via linearized least squares.
Sightings
| Author | Source | Type | Date | Other |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…