Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

A Critical Wake-Up Call: VMware vCenter Server RCE Bug Exploited in Attacks


VMware vCenter Server RCE bug exploitation highlights the need for timely patching and robust security controls as threat actors increasingly target critical vulnerabilities in enterprise environments.

  • Two severe vulnerabilities, CVE-2024-38812 and CVE-2024-38813, have been identified in VMware vCenter Server, allowing attackers to remotely exploit them for code execution and privilege escalation.
  • Broadcom has released security updates to fix these vulnerabilities, but warns that the original patch may not fully address the flaw, emphasizing the need for immediate action.
  • No workarounds are available for these security flaws, making timely patching crucial to block attacks exploiting them.
  • Threat actors, including ransomware gangs and state-sponsored hackers, frequently target vulnerabilities in VMware vCenter Server, highlighting the importance of regular system updates and robust security controls.



  • Critical vulnerabilities have been identified and exploited in the VMware vCenter Server, a critical component of many enterprise environments. A recent development has highlighted the severity of these issues, with attackers leveraging two remotely exploitable vulnerabilities to compromise systems.

    On November 18, 2024, Broadcom warned that attackers were now exploiting two severe vulnerabilities in VMware vCenter Server. The first vulnerability, identified as CVE-2024-38812, is a critical Remote Code Execution (RCE) flaw caused by a heap overflow weakness in the vCenter's DCE/RPC protocol implementation. This vulnerability affects products containing vCenter, including VMware vSphere and VMware Cloud Foundation.

    The second vulnerability, tracked as CVE-2024-38813, is a privilege escalation flaw that enables attackers to escalate privileges to root with a specially crafted network packet. Broadcom confirmed that exploitation has occurred in the wild for both CVE-2024-38812 and CVE-2024-38813.

    In September 2024, Broadcom released security updates to fix these vulnerabilities. Despite this, roughly one month later, the company updated the security advisory warning that the original CVE-2024-38812 patch had not fully addressed the flaw and strongly encouraged admins to apply the new patches.

    No workarounds are available for these security flaws, so impacted customers are advised to apply the latest updates immediately to block attacks actively exploiting them. Broadcom has also released a supplemental advisory with additional information on deploying the security updates on vulnerable systems and known issues that could impact those who have already upgraded.

    Threat actors, including ransomware gangs and state-sponsored hacking groups, frequently target vulnerabilities in VMware vCenter Server. In January 2024, Broadcom revealed that Chinese state hackers had been exploiting a critical vCenter Server vulnerability (CVE-2023-34048) as a zero-day since at least late 2021.

    This threat group, tracked as UNC3886 by security firm Mandiant, abused the flaw to deploy VirtualPita and VirtualPie backdoors on ESXi hosts via maliciously crafted vSphere Installation Bundles (VIBs).

    The recent exploitation of these vulnerabilities highlights the importance of timely patching and regular system updates. It also emphasizes the need for organizations to prioritize their cybersecurity posture, particularly when it comes to critical systems like VMware vCenter Server.

    In light of this development, IT administrators and security teams must take immediate action to address these vulnerabilities and prevent potential attacks. This includes applying all available patches and updates, monitoring systems for suspicious activity, and implementing robust security controls to mitigate the impact of such exploits.

    Furthermore, organizations should conduct a thorough risk assessment to identify and prioritize their most critical systems and applications, ensuring that they are adequately protected against emerging threats like the VMware vCenter Server RCE bug.

    In conclusion, the exploitation of the CVE-2024-38812 and CVE-2024-38813 vulnerabilities in VMware vCenter Server serves as a stark reminder of the importance of staying vigilant and proactive in our approach to cybersecurity. By prioritizing timely patching, robust security controls, and risk management, organizations can minimize their exposure to these types of attacks and protect their critical systems and data.

    VMware vCenter Server RCE bug exploitation highlights the need for timely patching and robust security controls as threat actors increasingly target critical vulnerabilities in enterprise environments.



    Related Information:

  • https://www.bleepingcomputer.com/news/security/critical-rce-bug-in-vmware-vcenter-server-now-exploited-in-attacks/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-38812

  • https://www.cvedetails.com/cve/CVE-2024-38812/

  • https://nvd.nist.gov/vuln/detail/CVE-2024-38813

  • https://www.cvedetails.com/cve/CVE-2024-38813/

  • https://nvd.nist.gov/vuln/detail/CVE-2023-34048

  • https://www.cvedetails.com/cve/CVE-2023-34048/


  • Published: Mon Nov 18 13:14:57 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us