Vulnerability Details : CVE-2022-31711
Public exploit exists!
VMware vRealize Log Insight contains an Information Disclosure Vulnerability. A malicious actor can remotely collect sensitive session and application information without authentication.
Vulnerability category: Information leak
Products affected by CVE-2022-31711
- cpe:2.3:a:vmware:vrealize_log_insight:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:vrealize_log_insight:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2022-31711
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 47 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2022-31711
-
VMware vRealize Log Insight Unauthenticated RCE
Disclosure Date: 2023-01-24First seen: 2023-09-11exploit/linux/http/vmware_vrli_rceVMware vRealize Log Insights versions v8.x contains multiple vulnerabilities, such as directory traversal, broken access control, deserialization, and information disclosure. When chained together, these vulnerabilities allow a remote, unauthenticated attacker to
CVSS scores for CVE-2022-31711
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.3
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N |
3.9
|
1.4
|
NIST |
References for CVE-2022-31711
-
http://packetstormsecurity.com/files/174606/VMware-vRealize-Log-Insight-Unauthenticated-Remote-Code-Execution.html
VMware vRealize Log Insight Unauthenticated Remote Code Execution ≈ Packet Storm
-
https://www.vmware.com/security/advisories/VMSA-2023-0001.html
VMSA-2023-0001Patch;Vendor Advisory
Jump to