5 min read
By: RedLegg's Cyber Threat Intelligence Team
About:
RedLegg will occasionally communicate vulnerabilities released outside the usual release schedule to provide additional value to our customers. These emergency bulletins describe vulnerabilities or threats we classify as the highest severity level and warrant out-of-band emergency patching or mitigation action.
VULNERABILITIES
Heap-Overflow Vulnerability in VMware vCenter Server
CVSS Score: 9.8 (Critical)
Identifier: CVE-2024-38812
Exploit or POC: No known public proof of concept has been reported.
Update: CVE-2024-38812 – VMware Security Advisory https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Description: CVE-2024-38812 is a critical heap-overflow vulnerability in the DCE/RPC protocol implementation of VMware vCenter Server. This vulnerability can be exploited by sending specially crafted network packets, leading to potential remote code execution by an unauthenticated attacker.
Mitigation Recommendation: Patching is currently the only method of mitigation. Please update to the latest software versions listed in the VMware Security Update Guide https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968 Immediate patching is recommended to prevent exploitation.
Privilege Escalation Vulnerability in VMware vCenter Server
CVSS Score: 7.5 (High)
Identifier: CVE-2024-38813
Exploit or POC: No known public proof of concept has been reported.
Update: CVE-2024-38813 – VMware Security Advisory https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Description: CVE-2024-38813 is a privilege escalation vulnerability in VMware vCenter Server. This flaw allows attackers with network access to escalate privileges to root by sending specially crafted packets, potentially gaining full control over the system.
Mitigation Recommendation: Patching is currently the only method of mitigation. Please update to the latest software versions listed in the VMware Security Update Guide https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968Apply the patch as soon as possible to prevent escalation attacks.