Wednesday, January 22, 2025
Homecyber securityVMware vCenter Server Vulnerability Let Attackers Escalate Privileges

VMware vCenter Server Vulnerability Let Attackers Escalate Privileges

Published on

SIEM as a Service

Follow Us on Google News

VMware has issued a critical security advisory (VMSA-2024-0019) addressing two significant vulnerabilities in its vCenter Server and VMware Cloud Foundation products.

CVE-2024-38812 and CVE-2024-38813 vulnerabilities could allow attackers to execute remote code and escalate privileges.

CVE-2024-38812: Heap-Overflow Vulnerability

The first vulnerability, CVE-2024-38812, is a heap overflow issue found in implementing the DCERPC protocol within the vCenter Server, as per a report by Broadcom.

This vulnerability has been assigned a maximum CVSSv3 base score of 9.8, placing it in the critical severity range.

Attackers with access to vCenter Server can exploit this vulnerability by sending specially crafted network packets.

Successful exploitation could lead to remote code execution, allowing attackers to gain control over the affected systems.

Resolution

VMware has released updates to address this vulnerability. Users are advised to apply the updates in the ‘Fixed Version’ column of the response matrix to secure their deployments.

No viable in-product workarounds are available for CVE-2024-38812. VMware has provided a supplemental FAQ for further clarification on this issue.

Decoding Compliance: What CISOs Need to Know – Join Free Webinar

CVE-2024-38813: Privilege Escalation Vulnerability

CVE-2024-38813 is a privilege escalation vulnerability that allows attackers with network access to escalate privileges to the root by sending specially crafted network packets. This vulnerability carries a CVSSv3 base score of 7.5, categorized as critical.

Like the heap overflow vulnerability, attackers can exploit this issue remotely by accessing the network and sending malicious packets, potentially gaining elevated privileges.

Resolution

Updates are available for affected deployments to remediate this vulnerability. Users should refer to the response matrix for details on securing their systems.

There are no workarounds for CVE-2024-38813. VMware has also provided additional documentation through a supplemental FAQ.

Response Matrix

VMware ProductVersionCVE(s)CVSSv3SeverityFixed Version
vCenter Server8.0CVE-2024-38812, 388139.8, 7.5Critical8.0 U3b
vCenter Server7.0CVE-2024-38812, 388139.8, 7.5Critical7.0 U3s
VMware Cloud Foundation5.xCVE-2024-38812, 388139.8, 7.5CriticalAsync patch to 8.0 U3b
VMware Cloud Foundation4.xCVE-2024-38812, 388139.8, 7.5CriticalAsync patch to 7.0 U3s

VMware urges all affected product users to apply these updates promptly to mitigate potential risks associated with these vulnerabilities.

Are You From SOC/DFIR Teams? - Try Advanced Malware and Phishing Analysis With ANY.RUN - 14-day free trial

Divya
Divya
Divya is a Senior Journalist at GBhackers covering Cyber Attacks, Threats, Breaches, Vulnerabilities and other happenings in the cyber world.

Latest articles

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a...

SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL

In a recent discovery, a security researcher uncovered a critical SQL injection vulnerability on...

Three New ICS Advisories Released by CISA Detailing Vulnerabilities & Mitigations

The Cybersecurity and Infrastructure Security Agency (CISA) announced three new Industrial Control Systems (ICS)...

API Security Webinar

Free Webinar - DevSecOps Hacks

By embedding security into your CI/CD workflows, you can shift left, streamline your DevSecOps processes, and release secure applications faster—all while saving time and resources.

In this webinar, join Phani Deepak Akella ( VP of Marketing ) and Karthik Krishnamoorthy (CTO), Indusface as they explores best practices for integrating application security into your CI/CD workflows using tools like Jenkins and Jira.

Discussion points

Automate security scans as part of the CI/CD pipeline.
Get real-time, actionable insights into vulnerabilities.
Prioritize and track fixes directly in Jira, enhancing collaboration.
Reduce risks and costs by addressing vulnerabilities pre-production.

More like this

Record Breaking 5.6 Tbps DDoS attack Launched by Mirai Botnet

 The Mirai botnet unleashed a record-breaking Distributed Denial of Service (DDoS) attack on October...

Criminal IP and OnTheHub Partner to Deliver Advanced Cybersecurity Solutions for Education

AI SPERA, a leading Cyber Threat Intelligence (CTI) provider, has collaborated with OnTheHub, a...

SQL Injection Vulnerability in Microsoft’s DevBlogs Lets Hackers Injecting Malicious SQL

In a recent discovery, a security researcher uncovered a critical SQL injection vulnerability on...