### [CVE-2023-20891](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20891) ![](https://img.shields.io/static/v1?label=Product&message=Isolation%20segment&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Tanzu%20Application%20Service%20for%20VMs&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.0.x%3C%204.0.4%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.0.x%3C%204.0.5%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-532%3A%20Insertion%20of%20Sensitive%20Information%20into%20Log%20File&color=brighgreen) ### Description The VMware Tanzu Application Service for VMs and Isolation Segment contain an information disclosure vulnerability due to the logging of credentials in hex encoding in platform system audit logs. A malicious non-admin user who has access to the platform system audit logs can access hex encoded CF API admin credentials and can push new malicious versions of an application. In a default deployment non-admin users do not have access to the platform system audit logs. ### POC #### Reference - https://www.vmware.com/security/advisories/VMSA-2023-0016.html #### Github No PoCs found on GitHub currently.