Broadcom released security updates to address a critical vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), in VMware vCenter Server<\/a> that could lead to remote code execution.<\/p>\n\n\n\n
“A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.” reads the advisory<\/a>.<\/em>
zbl & srs of team TZL\u00a0discovered both vulnerabilities during the 2024 Matrix Cup<\/a> contest and reported the flaw to Broadcom. <\/p>\n\n\n\n
“These vulnerabilities are memory management and corruption issues which can be used against VMware vCenter services, potentially allowing remote code execution.” states the company<\/a>.<\/em><\/p>\n\n\n\n
Broadcom it’s not aware of attacks in the wild exploiting these vulnerabilities. <\/p>\n\n\n\n
In June, VMware addressed multiple vCenter Server vulnerabilities that remote attackers can exploit to achieve remote code execution or privilege escalation.<\/p>\n\n\n\n
Two heap-overflow flaws, tracked as CVE-2024-37079 and CVE-2024-37080<\/a> respectively, impacted the implementation of the DCERPC protocol.<\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, VMware )\u00a0<\/strong>