Article Details
Scrape Timestamp (UTC): 2024-06-18 08:26:15.279
Source: https://thehackernews.com/2024/06/vmware-issues-patches-for-cloud.html
Original Article Text
Click to Toggle View
VMware Issues Patches for Cloud Foundation, vCenter Server, and vSphere ESXi. VMware has released updates to address critical flaws impacting Cloud Foundation, vCenter Server, and vSphere ESXi that could be exploited to achieve privilege escalation and remote code execution. The list of vulnerabilities is as follows - This is not the first time VMware has addressed shortcomings in the implementation of the DCE/RPC protocol. In October 2023, the Broadcom-owned virtualization services provider patched another critical security hole (CVE-2023-34048, CVSS score: 9.8) that could also be abused to execute arbitrary code remotely. Chinese cybersecurity company QiAnXin LegendSec researchers Hao Zheng and Zibo Li have been credited with discovering and reporting CVE-2024-37079 and CVE-2024-37080. The discovery of CVE-2024-37081 has been credited to Matei "Mal" Badanoiu at Deloitte Romania. All three issues, which affect vCenter Server versions 7.0 and 8.0, have been addressed in versions 7.0 U3r, 8.0 U1e, and 8.0 U2d. While there are no known reports of any of the vulnerabilities being actively exploited in the wild, it's essential that users move quickly to apply the patches in light of their criticality. Continuous Attack Surface Discovery & Penetration Testing Continuously discover, prioritize, & mitigate exposures with evidence-backed ASM, Pentesting, and Red Teaming.
Daily Brief Summary
VMware has released critical security updates for Cloud Foundation, vCenter Server, and vSphere ESXi.
The updates address vulnerabilities that could lead to privilege escalation and remote code execution.
Identified vulnerabilities include two discovered by researchers at QiAnXin LegendSec and one by Deloitte Romania.
Affected versions are specifically vCenter Server versions 7.0 and 8.0; patches are available in newer subversions.
Prior similar issues were patched in October 2023, involving the DCE/RPC protocol.
VMware advises users to apply these critical patches promptly despite no current active exploitation reports.