Software Update Released to Address Critical VMware vCenter Vulnerability Enabling Remote Code Execution

Sep 18, 2024Ravie LakshmananVirtualization / Network Safety

Broadcom issued updates on Tuesday to fix a severe security weakness affecting VMware vCenter Server that could result in remote code execution.

Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code Execution

Sep 18, 2024Ravie LakshmananVirtualization / Network Safety

Patch Issued for Critical VMware vCenter Flaw Allowing Remote Code Execution

Broadcom issued updates on Tuesday to fix a severe security weakness affecting VMware vCenter Server that could result in remote code execution.

The security flaw, identified as CVE-2024-38812 (CVSS score: 9.8), is a heap-overflow vulnerability in the DCE/RPC protocol.

The provider of virtualization services stated in a bulletin that “By transmitting a specifically crafted network packet, a hacker with network access to vCenter Server could exploit this vulnerability and potentially achieve remote code execution,”.

Information Security

This vulnerability is comparable to two other remote code execution vulnerabilities, CVE-2024-37079 and CVE-2024-37080 (CVSS scores: 9.8), that were addressed by VMware in vCenter Server in June 2024.

VMware also addressed a privilege escalation vulnerability in the vCenter Server (CVE-2024-38813, CVSS score: 7.5) which could allow an attacker with network access to the instance to escalate privileges to root by sending a meticulously crafted network packet.

During the cybersecurity competition Matrix Cup held in China in June 2024, security researchers zbl and srs from team TZL were acknowledged for discovering and reporting these two vulnerabilities. The flaws have been resolved in the versions mentioned below –

  • vCenter Server 8.0 (Resolved in 8.0 U3b)
  • vCenter Server 7.0 (Resolved in 7.0 U3s)
  • VMware Cloud Foundation 5.x (Resolved in 8.0 U3b as an asynchronous patch)
  • VMware Cloud Foundation 4.x (Resolved in 7.0 U3s as an asynchronous patch)

Broadcom has stated that although there are no known instances of malicious exploitation of these two vulnerabilities, customers are advised to update to the latest versions to protect against potential threats.

“These vulnerabilities consist of memory management and corruption issues that may be exploited against VMware vCenter services, possibly allowing for remote code execution,” the company stated.

Information Security

These developments occurred as the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) jointly issued a combined advisory encouraging organizations to focus on eliminating cross-site scripting (XSS) vulnerabilities that malicious actors could exploit to infiltrate systems.

“Manufacturers’ inability to properly verify, sanitize, or escape inputs leads to the emergence of cross-site scripting vulnerabilities,” the governmental agencies explained. “These failures create opportunities for threat actors to embed harmful scripts into web applications, leveraging them to manipulate, steal, or misemploy data across diverse contexts.”

Enjoyed this article? Stay updated by following us on Twitter and LinkedIn for more unique content.

About Author

Subscribe To InfoSec Today News

You have successfully subscribed to the newsletter

There was an error while trying to send your request. Please try again.

World Wide Crypto will use the information you provide on this form to be in touch with you and to provide updates and marketing.