November 19, 2024 at 02:03AM
Recently patched vulnerabilities in Progress Kemp LoadMaster and VMware vCenter Server are being actively exploited. CISA added CVE-2024-1212, a critical flaw, to its Known Exploited Vulnerabilities catalog. Other vulnerabilities in VMware include CVE-2024-38812 and CVE-2024-38813, with remediation recommended by December 9, 2024, for federal agencies.
**Meeting Takeaways – November 19, 2024**
1. **Active Exploitation of Vulnerabilities**:
– Critical security flaws in Progress Kemp LoadMaster and VMware vCenter Server are being actively exploited.
2. **Progress Kemp LoadMaster**:
– The vulnerability CVE-2024-1212, with a CVSS score of 10.0, allows unauthenticated remote access and command execution on the system, as confirmed by CISA.
– This flaw was patched by Progress Software in February 2024 but is listed in the CISA’s Known Exploited Vulnerabilities (KEV) catalog.
– Rhino Security Labs reported that successful exploitation could give attackers full control over the load balancer.
3. **VMware vCenter Server Vulnerabilities**:
– Two main vulnerabilities, CVE-2024-38812 (CVSS score: 9.8) and CVE-2024-38813 (CVSS score: 7.5), are being exploited.
– CVE-2024-38812 involves a heap-overflow vulnerability allowing remote code execution, while CVE-2024-38813 involves privilege escalation to root.
– Both were originally patched in September 2024, with CVE-2024-38812 receiving an additional fix last month due to previous patch inadequacy.
4. **CISA Recommendations**:
– CISA is urging Federal Civilian Executive Branch agencies to remediate CVE-2024-1212 by December 9, 2024, to enhance network security.
5. **Related Cybersecurity Concerns**:
– Cybercriminals are also leveraging a significant flaw in Veeam Backup & Replication (CVE-2024-40711, CVSS score: 9.8) to deploy ransomware known as Frag.
This summary highlights critical vulnerabilities that need immediate attention and the recommendations from CISA for remediation. Ensure to monitor further developments and stay updated on cybersecurity practices.