Vmware’s Critical Severity Vulnerability Found Comprising Of RCE And Heap Overflow

Please be advised, VMware users who follow hackingblogs, that serious vulnerabilities have been found in both VMware vCenter Server and VMware Cloud Foundation. We will talk about these two vulnerabilities in a moment. They are the VMware vCenter Server heap-overflow vulnerability and the VMware vCenter privilege escalation issue.

The severity score for this serious vulnerabilities is 9.8 out of 10, while the other has This vulnerability has a high level of severity (7.5 out of 10).

These vulnerabilities are being used by hackers to remotely code and totally compromise the systems. Additionally, hackers can use a specially constructed network packet to elevate privileges to root.

vmware

 VMware by Broadcom has determined that the vCenter patches released on September 17, 2024 did not fully address CVE-2024-38812. All customers are strongly encouraged to apply the patches currently listed in the Response Matrix. Additionally, patches for 8.0 U2 line are also available.

Broadcom Said In An Article

The compromised assets in this bug are VMware Cloud Foundation and VMware vCenter Server.

What Is Vcenter Server ?

Making folks comfortable with the program we will be working with is important before they understand what its flaws are. To put it simply, vCenter is a platform for central management of VMware virtual environments. Administrators may manage and keep an eye on numerous VMware vSphere hosts, clusters, and virtual machines from a single interface with the help of this control panel-like tool.

Deploying, managing, and troubleshooting virtual machines and data centres is made simpler by vCenter’s features, which include resource allocation, performance monitoring, and security management. Consider it your “brain” for managing and improving your virtual infrastructure.

 VMware vCenter Server heap-overflow vulnerability (CVE-2024-38812) 

Alright, let us discuss this issue, which primarily affects vCenter Server. Here, the DCERPC protocol implementation on the server has a heap-overflow vulnerability.

An application may crash, become unstable, or run malicious code as a result of an attacker executing a heap overflow attack to write data past the end of a heap buffer. Because heap overflows can result in data corruption and uncontrolled code execution, they pose a major security risk.

Networked computers can communicate with one another using the Distributed Computing Environment/Remote Procedure Call (DCE/RPC) protocol. It enables processes to invoke functions or processes on distant systems just like they would on their own. Database access, file sharing, and authentication are just a few of the uses for DCE/RPC.

To fix CVE-2024-38812 and fix the bug in your software, apply the updates indicated in the ‘Fixed Version’ column of the ‘Response Matrix’ below to the deployments that are impacted.

 VMware vCenter privilege escalation vulnerability (CVE-2024-38813) 

The second weakness found was the VMware vCenter privilege escalation vulnerability, which allows a hacker to get access to vCenter Server and use it to deliver a specially constructed network packet that elevates rights to root. By taking advantage of security flaws, a threat actor in this type of attack obtains elevated access and administrative rights to a system.

VMware ProductVersionRunning OnCVECVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware vCenter Server8.0AnyCVE-2024-38812, CVE-2024-388139.87.5Critical8.0 U3d [1]NoneFAQ
VMware vCenter Server8.0AnyCVE-2024-38812, CVE-2024-388139.87.5Critical8.0 U2e NoneFAQ
VMware vCenter Server7.0AnyCVE-2024-38812, CVE-2024-388139.87.5Critical
7.0 U3t [1]NoneFAQ
VMware Cloud Foundation5.xAnyCVE-2024-38812, CVE-2024-388139.87.5Critical
Async patch to 8.0 U3d  [1]NoneAsync Patching Guide: KB88287
VMware Cloud Foundation5.1.xAnyCVE-2024-38812, CVE-2024-388139.87.5CriticalAsync patch to 8.0 U2e  NoneAsync Patching Guide: KB88287
VMware Cloud Foundation4.xAnyCVE-2024-38812, CVE-2024-388139.87.5Critical
Async patch to 7.0 U3t [1]NoneAsync Patching Guide: KB88287

About The Author

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top