VMware addressed multiple vCenter Server vulnerabilities that remote attackers can exploit to achieve remote code execution or privilege escalation.<\/p>\n\n\n\n
vCenter Server is a centralized management platform developed by VMware for managing virtualized environments.<\/p>\n\n\n\n
The vCenter Server contains multiple heap-overflow flaws, tracked as CVE-2024-37079,\u00a0CVE-2024-37080 (maximum CVSSv3 base score 9.8), in the implementation of the DCERPC protocol. <\/p>\n\n\n\n
“<\/strong>A malicious actor with network access to vCenter Server may trigger these vulnerabilities by sending a specially crafted network packet potentially leading to remote code execution.” reads the advisory<\/strong><\/a> published by the company.<\/p>\n\n\n\n
The issue was reported by Matei “Mal” Badanoiu from Deloitte Romania<\/p>\n\n\n\n
VMware confirmed<\/a> that it is not aware of attacks in the wild exploiting these issues.
The following table reports impacted products and fixed versions:<\/p>\n\n\n\n