Active Exploitation of Critical VMware vCenter Server Vulnerabilities: Urgent Patch Advisory

Active Exploitation of Critical VMware vCenter Server Vulnerabilities: Urgent Patch Advisory

Martin Kouyoumdjian |

Article

Vulnerabilities and Active Exploitation

As reported on November 19, 2024, the VMware vCenter Server is facing active exploitation of critical vulnerabilities known as CVE-2024-38812 and CVE-2024-38813. According to Broadcom, these vulnerabilities are confirmed as being targeted in wild scenarios, raising significant concerns for system administrators.

The first vulnerability, CVE-2024-38812, is particularly severe due to its nature as a heap-overflow issue in the DCERPC protocol implementation. This flaw provides a pathway for remote code execution (RCE), a formidable threat that can compromise entire systems.

Severity and Impact Analysis

CVE-2024-38812 is categorized as a critical vulnerability with a CVSS score of 9.8, which illustrates the high risk of potential exploitation. Such a score underscores the urgent need for remediation as it signifies a substantial threat to IT infrastructures relying on this software.

The scope of affected products is broad, impacting versions of vCenter Server and VMware Cloud Foundation prior to 8.0 U3b and 7.0 U3s. This includes widely used environments like VMware vSphere, further amplifying the risk and necessary response actions.

Patch Deployment and System Recommendations

The vulnerabilities can be exploited by an attacker with network access to the vCenter Server. By transmitting specially crafted network packets, an adversary could potentially achieve RCE or escalate privileges to a root level. Such capabilities underline the critical severity of these vulnerabilities.

Initially, VMware released patches in September 2024, but these did not completely mitigate CVE-2024-38812. As a result, further updates were issued in October 2024. Administrators should refer to VMware’s security advisory VMSA-2024-0019 for guidance on applying the latest necessary patches.

Securing the Infrastructure

The broader impact of these vulnerabilities means that products containing vCenter are also at risk, like VMware vSphere and VMware Cloud Foundation. This widespread vulnerability demands prompt action to secure potentially exposed virtualized infrastructures.

In light of the absence of workarounds, Broadcom strongly advises administrators to implement the latest updates without delay. Ensuring these systems are patched is crucial to preventing possible attacks and maintaining the security of IT operations across affected platforms.