CVE-2023-34060: Authentication Bypass Vulnerability in VMware Cloud Director Appliance (VCD Appliance)
VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from an older version. On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console) . This bypass is not present on port 443 (VCD provider and tenant login). On a new installation of VMware Cloud Director Appliance 10.5, the bypass is not present. VMware Cloud Director Appliance is impacted since it uses an affected version of sssd from the underlying Photon OS. The sssd issue is no longer present in versions of Photon OS that ship with sssd-2.8.1-11 or higher (Photon OS 3) or sssd-2.8.2-9 or higher (Photon OS 4 and 5).
CVE-2023-34060: Authentication Bypass Vulnerability in VMware Cloud Director Appliance (VCD Appliance)
Description
VMware Cloud Director Appliance contains an authentication bypass vulnerability in case VMware Cloud Director Appliance was upgraded to 10.5 from an older version. On an upgraded version of VMware Cloud Director Appliance 10.5, a malicious actor with network access to the appliance can bypass login restrictions when authenticating on port 22 (ssh) or port 5480 (appliance management console) . This bypass is not present on port 443 (VCD provider and tenant login). On a new installation of VMware Cloud Director Appliance 10.5, the bypass is not present. VMware Cloud Director Appliance is impacted since it uses an affected version of sssd from the underlying Photon OS. The sssd issue is no longer present in versions of Photon OS that ship with sssd-2.8.1-11 or higher (Photon OS 3) or sssd-2.8.2-9 or higher (Photon OS 4 and 5).
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- vmware
- Date Reserved
- 2023-05-25T17:21:56.204Z
- Cvss Version
- null
- State
- PUBLISHED
Threat ID: 694194799050fe8508060cfa
Added to database: 12/16/2025, 5:18:49 PM
Last updated: 12/16/2025, 5:22:50 PM
Views: 1
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2023-5997: Use after free in Google Chrome
UnknownCVE-2023-4804: CWE-489: Active Debug Code in Johnson Controls Quantum HD Unity Compressor
CriticalCVE-2023-4699: CWE-306 Missing Authentication for Critical Function in Mitsubishi Electric Corporation MELSEC-F Series FX3U-16MT/ES
CriticalCVE-2023-4474: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel NAS326 firmware
CriticalCVE-2023-4473: CWE-78 Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection') in Zyxel NAS326 firmware
CriticalActions
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.