Today's cybersecurity headlines are brought to you by ThreatPerspective


Ethical Hacking News

VMware Releases Critical Patches to Fix Remote Code Execution Vulnerability in vCenter Server



VMware has released critical patches to fix a remote code execution vulnerability in its vCenter Server. The patch addresses a heap-overflow vulnerability in the implementation of the DCE/RPC protocol, which could potentially be exploited by malicious actors with network access to vCenter Server. While there is no evidence that this vulnerability has been exploited in the wild, users are advised to update to the latest versions of vCenter Server to safeguard against potential threats.

  • vCenter Server users are advised to update to the latest versions due to a patched security flaw that could lead to remote code execution.
  • The vulnerability, CVE-2024-38812, has a CVSS score of 9.8 and is related to heap-overflow vulnerability in the DCE/RPC protocol.
  • Patches are available for vCenter Server versions 8.0 U3d, 8.0 U2e, and 7.0 U3t, as well as VMware Cloud Foundation versions 5.x, 5.1.x, and 4.x.
  • There are no known mitigations and users should update to the latest versions to safeguard against potential threats.
  • A law in China requires researchers to disclose vulnerabilities promptly, which could lead to nation-state adversaries stockpiling zero-days.
  • The vulnerability highlights the importance of staying up-to-date with software patches and prioritizing cybersecurity measures.



  • VMware, a leading provider of virtualization services, has released software updates to address an already patched security flaw in its vCenter Server that could pave the way for remote code execution. The vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), concerns a case of heap-overflow vulnerability in the implementation of the DCE/RPC protocol.

    A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution, according to Broadcom-owned virtualization services provider. The flaw was originally reported by zbl and srs of team TZL at the Matrix Cup cybersecurity competition held in China earlier this year.

    Although patches for the flaw are available in the below vCenter Server versions: 8.0 U3d, 8.0 U2e, and 7.0 U3t, it is also available as an asynchronous patch for VMware Cloud Foundation versions 5.x, 5.1.x, and 4.x. However, there are no known mitigations. While there is no evidence that the vulnerability has been ever exploited in the wild, users are advised to update to the latest versions to safeguard against potential threats.

    It's worth noting that China passed a law in July 2021 that requires vulnerabilities discovered by researchers in the country to be promptly disclosed to the government and the product's manufacturer. This could potentially lead to nation-state adversaries stockpiling zero-days and weaponizing them to their advantage.

    This critical vulnerability highlights the importance of staying up-to-date with software patches, especially for organizations relying on vCenter Server for virtualization management. With the rise of cloud-based services and virtualized environments, security threats have become increasingly sophisticated. As such, it is essential for businesses to prioritize cybersecurity measures and ensure that their infrastructure is protected from emerging vulnerabilities.

    In recent years, there has been an alarming increase in the number of cyberattacks on vCenter Server, with hackers exploiting various vulnerabilities to gain unauthorized access to sensitive data. The release of this patch by VMware serves as a timely reminder of the importance of proactive cybersecurity measures and regular software updates.

    Moreover, the fact that researchers from China reported this vulnerability at the Matrix Cup cybersecurity competition underscores the global nature of cyber threats. As such, it is crucial for organizations worldwide to remain vigilant and stay informed about emerging vulnerabilities and security threats.

    In conclusion, VMware's release of critical patches for vCenter Server marks an important step towards mitigating the risk of remote code execution vulnerabilities. While this vulnerability may have been patched, it serves as a stark reminder of the importance of staying up-to-date with software patches and prioritizing cybersecurity measures in today's digital landscape.



    Related Information:

  • https://thehackernews.com/2024/10/vmware-releases-vcenter-server-update.html

  • https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-vcenter-server-80u3b-release-notes/index.html


  • Published: Tue Oct 22 03:13:17 2024 by llama3.2 3B Q4_K_M













         


    © Ethical Hacking News . All rights reserved.

    Privacy | Terms of Use | Contact Us