VMware vCenter Server Multiple Critical Vulnerabilities

 

VMware vCenter Server Multiple Critical Vulnerabilities (CVE-2024-37079, CVE-2024-37080, & CVE-2024-37081)

VMware vCenter Server is vulnerable to multiple vulnerabilities that may allow attackers to elevate privileges and perform remote code execution. Tracked as CVE-2024-37079, CVE-2024-37080, & CVE-2024-37081, the vulnerabilities are given critical and important severity ratings.

VMware vCenter is an advanced server management software. The software has a centralized platform for controlling vSphere environments for visibility across hybrid clouds. The software protects the vCenter Server Appliance and related services with native high availability (HA) and a recovery time objective of less than 10 minutes.

VMware vCenter Server Heap-overflow Vulnerabilities (CVE-2024-37079, CVE-2024-37080)

These heap overflow vulnerabilities exist in the implementation of the DCERPC protocol. DCE/RPC, or Distributed Computing Environment/Remote Procedure Calls, is a network protocol allowing programmers to write distributed software running on the same computer. An attacker must have network access to the vCenter Server to exploit these vulnerabilities. An attacker may trigger these vulnerabilities by sending a specially crafted network packet and executing code remotely.

Hao Zheng and Zibo Li from the TianGong Team of Legendsec at Qi’anxin Group have discovered and reported the vulnerabilities.

VMware vCenter Local Privilege Escalation Vulnerability (CVE-2024-37081)

The local privilege escalation vulnerability originates from the misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit the vulnerability to escalate privileges to root on the vCenter Server Appliance.

Matei Badanoiu of Deloitte Romania has discovered and reported the vulnerabilities.

Affected Products

  • VMware vCenter Server
  • VMware Cloud Foundation

Affected Versions

  • vCenter Server versions 7.0 and 8.0
  • vCenter Server Cloud Foundation versions 4.x and 5.x

Mitigation

Customers must upgrade to VMware vCenter Server versions 8.0 U2d, 8.0 U1e, and 7.0 U3r to patch the vulnerabilities.

For more information about the mitigation, please refer to VMware Security Advisory (VMSA-2024-0012).

Qualys Detection

Qualys customers can scan their devices with QIDs 216323, 216324, and 216325 to detect vulnerable assets.

Please continue to follow Qualys Threat Protection for more coverage of the latest vulnerabilities.

References
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453

—•—•—•—•—
𝗦𝗺𝗮𝗿𝘁𝗡𝗲𝘁 – Security service provider, security solutions of the world’s leading technology companies. Contact our professional team for solution consultation, quotes, and technical support:
𝗦𝗺𝗮𝗿𝘁𝗡𝗲𝘁 𝗧𝗲𝗰𝗵𝗻𝗼𝗹𝗼𝗴𝘆 𝗖𝗼𝗺𝗽𝗮𝗻𝘆 𝗟𝗶𝗺𝗶𝘁𝗲𝗱
📍 Office 412, Dreamland Bonanza Building, 23 Duy Tan Street, My Dinh 2 Ward, Nam Tu Liem District, Hanoi, Vietnam
📍 259 Dong Den Street, 10 Ward, Tan Binh District, HCMC
📞 024 7774 8886
🔎 https://smartnet.net.vn/
📮 contact@smartnet.net.vn


#SmartNet #Qualys
#vCenter #VMware #Attacks #Security #cybersecurity #Critical