Join the Cyber Forum: Threat Intel on May 12, 2026 to learn how AI is reshaping threat defense.Join the Virtual Cyber Forum: Threat IntelRegister Now
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2023-34060

CVE-2023-34060: VMware Cloud Director Auth Bypass Flaw

CVE-2023-34060 is an authentication bypass vulnerability in VMware Cloud Director Appliance 10.5 upgraded from older versions. Attackers with network access can bypass login on SSH and management ports. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: February 4, 2026

CVE-2023-34060 Overview

VMware Cloud Director Appliance contains a critical authentication bypass vulnerability that affects systems upgraded to version 10.5 from older versions. This vulnerability allows a malicious actor with network access to the appliance to bypass login restrictions when authenticating on port 22 (SSH) or port 5480 (appliance management console). Importantly, this bypass does not affect port 443 (VCD provider and tenant login), and new installations of VMware Cloud Director Appliance 10.5 are not impacted.

The root cause stems from an affected version of sssd (System Security Services Daemon) bundled with the underlying Photon OS. The vulnerability is classified as CWE-306: Missing Authentication for Critical Function.

Critical Impact

Unauthenticated attackers with network access can bypass authentication on SSH (port 22) and the appliance management console (port 5480), potentially gaining unauthorized administrative access to VMware Cloud Director infrastructure.

Affected Products

  • VMware Cloud Director Appliance 10.5 (upgraded from older versions)
  • VMware Photon OS with sssd versions prior to 2.8.1-11 (Photon OS 3)
  • VMware Photon OS with sssd versions prior to 2.8.2-9 (Photon OS 4 and 5)

Discovery Timeline

  • November 14, 2023 - CVE-2023-34060 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2023-34060

Vulnerability Analysis

This authentication bypass vulnerability specifically targets VMware Cloud Director Appliance instances that were upgraded to version 10.5 from a previous version. The vulnerability does not manifest in fresh installations, indicating the issue arises from legacy configuration or state being preserved during the upgrade process.

The affected component is the System Security Services Daemon (sssd) within the underlying Photon OS. When sssd processes authentication requests on certain ports, it fails to properly enforce authentication requirements under specific upgrade conditions. This allows attackers to authenticate without providing valid credentials on SSH (port 22) and the appliance management console (port 5480).

The network-based attack vector requires no privileges or user interaction, making it highly exploitable in environments where these management ports are accessible from untrusted networks.

Root Cause

The vulnerability originates from a flaw in the sssd package bundled with Photon OS. During the upgrade process to VMware Cloud Director Appliance 10.5, the sssd configuration or state from the previous installation is carried forward, introducing a condition where authentication checks can be bypassed on specific ports.

The sssd daemon is responsible for providing access to remote identity and authentication resources. When the vulnerable version processes authentication attempts on ports 22 and 5480, it improperly validates credentials under the upgraded appliance configuration, allowing unauthorized access.

Attack Vector

The vulnerability is exploitable over the network without authentication. An attacker with network connectivity to the VMware Cloud Director Appliance can target either:

  1. SSH Service (Port 22): Bypass authentication to gain shell access to the underlying appliance operating system
  2. Appliance Management Console (Port 5480): Bypass authentication to access the administrative web interface for appliance configuration

The attack does not require any user interaction or prior privileges, making it particularly dangerous for internet-facing or inadequately segmented deployments. The scope is limited to the vulnerable appliance itself, but successful exploitation could lead to complete compromise of the virtualization management infrastructure.

Detection Methods for CVE-2023-34060

Indicators of Compromise

  • Successful SSH authentication events without corresponding valid credential entries in authentication logs
  • Unexpected administrative sessions on the appliance management console (port 5480) from unauthorized IP addresses
  • Authentication log anomalies showing accepted logins without proper authentication sequence
  • Unusual configuration changes or user account modifications on the appliance

Detection Strategies

  • Monitor authentication logs on VMware Cloud Director Appliance for SSH and port 5480 access patterns
  • Implement network traffic analysis to detect unauthorized connection attempts to ports 22 and 5480
  • Deploy intrusion detection rules to alert on authentication bypass patterns specific to sssd vulnerabilities
  • Review appliance access logs for connections from unexpected source IP addresses

Monitoring Recommendations

  • Enable verbose logging on SSH and appliance management console services
  • Configure SIEM correlation rules to detect authentication anomalies on VMware infrastructure
  • Implement network segmentation monitoring to ensure management ports are not accessible from untrusted networks
  • Establish baseline authentication patterns and alert on deviations

How to Mitigate CVE-2023-34060

Immediate Actions Required

  • Identify all VMware Cloud Director Appliance instances upgraded to version 10.5 from older versions
  • Restrict network access to ports 22 and 5480 using firewall rules to trusted management networks only
  • Audit recent authentication logs for signs of unauthorized access
  • Apply the appropriate Photon OS security updates as soon as possible

Patch Information

VMware has released security updates through Photon OS to address this vulnerability. The fix is included in:

  • Photon OS 3: sssd version 2.8.1-11 or higher
  • Photon OS 4 and 5: sssd version 2.8.2-9 or higher

Administrators should reference the official VMware Security Advisory VMSA-2023-0026 for detailed patching instructions. Additional security updates are available in the Photon OS 3.0 Security Update 687, Photon OS 4.0 Security Update 512, and Photon OS 5.0 Security Update 143.

Workarounds

  • Implement strict firewall rules to block external access to ports 22 and 5480 on affected appliances
  • Deploy network segmentation to isolate VMware Cloud Director management interfaces from general network traffic
  • Use jump hosts or VPN for administrative access to management ports
  • Consider temporarily disabling SSH access if not operationally required until patches can be applied
bash
# Example firewall configuration to restrict management port access
# Restrict SSH access to trusted management subnet only
iptables -A INPUT -p tcp --dport 22 -s 10.0.100.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 22 -j DROP

# Restrict appliance management console to trusted management subnet
iptables -A INPUT -p tcp --dport 5480 -s 10.0.100.0/24 -j ACCEPT
iptables -A INPUT -p tcp --dport 5480 -j DROP

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeAuth Bypass

  • Vendor/TechVmware Cloud Director

  • SeverityCRITICAL

  • CVSS Score9.8

  • EPSS Probability0.07%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityHigh
  • CWE References
  • CWE-306
  • Vendor Resources
  • GitHub Security Update 3.0

  • GitHub Security Update 4.0

  • GitHub Security Update 5.0

  • VMware Security Advisory VMSA-2023-0026
  • Latest CVEs
  • CVE-2026-25874: LeRobot RCE Vulnerability

  • CVE-2026-41272: Flowise LLM Builder SSRF Vulnerability

  • CVE-2026-41268: Flowise RCE Vulnerability

  • CVE-2026-41265: Flowise Airtable Agent RCE Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English