{"id":168536,"date":"2024-09-18T07:41:26","date_gmt":"2024-09-18T07:41:26","guid":{"rendered":"https:\/\/securityaffairs.com\/?p=168536"},"modified":"2024-09-18T07:43:18","modified_gmt":"2024-09-18T07:43:18","slug":"vmware-vcenter-server-cve-2024-38812","status":"publish","type":"post","link":"https:\/\/securityaffairs.com\/168536\/security\/vmware-vcenter-server-cve-2024-38812.html","title":{"rendered":"Broadcom fixed Critical VMware vCenter Server flaw CVE-2024-38812"},"content":{"rendered":"
<\/div>\n

Broadcom addressed a critical vulnerability in the VMware vCenter Server that could allow remote attackers to achieve code execution.<\/h2>\n\n\n\n

Broadcom released security updates to address a critical vulnerability, tracked as CVE-2024-38812 (CVSS score: 9.8), in VMware vCenter Server<\/a> that could lead to remote code execution.<\/p>\n\n\n\n

vCenter Server is a critical component in VMware virtualization and cloud computing software suite. It serves as a centralized and comprehensive management platform for VMware\u2019s virtualized data centers.<\/gwmw><\/gwmw><\/p>\n\n\n\n

The vulnerability is a heap-overflow vulnerability that resides in the implementation of the DCERPC protocol. <\/p>\n\n\n\n

“A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.” reads the advisory<\/a>.<\/em><\/gwmw><\/p>\n\n\n\n

The company also addressed a privilege escalation vulnerability, tracked as CVE-2024-38813, in vCenter Server.<\/gwmw><\/p>\n\n\n\n

“A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.” reads the advisory.<\/em><\/p>\n\n\n\n

zbl & srs of team TZL\u00a0discovered both vulnerabilities during the 2024 Matrix Cup<\/a> contest and reported the flaw to Broadcom. <\/p>\n\n\n\n

“These vulnerabilities are memory management and corruption issues which can be used against VMware vCenter services, potentially allowing remote code execution.” states the company<\/a>.<\/em><\/p>\n\n\n\n

The virtualization giant addressed the vulnerabilities with the release of the following versions:<\/p>\n\n\n\n