Critical Code Execution Vulnerabilities Patched in VMware vCenter Server

Critical Code Execution Vulnerabilities Patched in VMware vCenter Server

June 18, 2024 at 12:36PM

VMware, owned by Broadcom, has released patches for severe vCenter Server vulnerabilities, including heap-overflow flaws and local privilege escalation issues. These could lead to remote code execution or elevate privileges to root. Chinese cybersecurity company Qi An Xin and Matei Badanoiu of Deloitte Romania were credited for reporting the vulnerabilities. Fixes are available for impacted vCenter Server versions.

Key Takeaways from the meeting notes:

– VMware has announced patches for several serious vCenter Server vulnerabilities, including heap-overflow vulnerabilities and high-severity local privilege escalation vulnerabilities.
– The heap-overflow vulnerabilities, tracked as CVE-2024-37079 and CVE-2024-37080, are classified as critical and impact the implementation of the DCERPC protocol. They may allow remote code execution.
– Researchers from Chinese cybersecurity company Qi An Xin and Matei Badanoiu of Deloitte Romania have been credited for reporting the identified flaws.
– The company clarified that it’s not aware of attacks exploiting any of the three vulnerabilities in the wild.
– vCenter Server versions 7.0 and 8.0 are impacted, and fixes for the vulnerabilities are included in versions 8.0 U2d, 8.0 U1e, and 7.0 U3r.
– The location of VMware security advisories changed recently and they are now available on the Broadcom Support Portal.

Let me know if there’s anything else you’d like to highlight or if you need further clarification on any of the points.

Full Article