Article Details
Scrape Timestamp (UTC): 2024-06-18 18:10:53.094
Original Article Text
Click to Toggle View
VMware fixes critical vCenter RCE vulnerability, patch now. VMware has issued a security advisory addressing critical vulnerabilities in vCenter Server, including remote code execution and local privilege escalation flaws. VMware vCenter Server is a central management platform for VMware vSphere, enabling the management of virtual machines and ESXi hosts. Today, the vendor released fixes for three vulnerabilities, namely CVE-2024-37079, CVE-2024-37080, CVE-2024-37081, summarized as follows: The above flaws impact VMware vCenter Server versions 7.0 and 8.0 and VMware Cloud Foundation versions 4.x and 5.x. Security updates were made available in VMware vCenter Server 8.0 U2d, 8.0 U1e, and 7.0 U3r. For Cloud Foundation, patches were pushed through KB88287. The vendor says that updating vCenter Server does not affect running workloads or VMs, but a temporary unavailability is to be expected on vSphere Client and other management interfaces during the update. Also, an issue with custom ciphers was detected in 7.0 U3r (also in U3q). A precheck is recommended to catch the problem, while users can also refer to the corresponding knowledge base article. The vendor said there are no viable in-product workarounds or mitigations for these vulnerabilities, so the recommended solution is to apply the updates as soon as possible. In a FAQ page VMware published to accompany the security bulletin, the company says that no active exploitation of the flaws has been detected in the wild as of yet. However, it is not uncommon for vCenter flaws to be targeted by threat actors when they are disclosed, so admins must apply the updates as soon as possible.
Daily Brief Summary
VMware issued a security advisory for critical vulnerabilities in vCenter Server, affecting remote code execution and local privilege escalation.
Affected versions include vCenter Server 7.0 and 8.0, along with VMware Cloud Foundation 4.x and 5.x.
Three specific vulnerabilities were addressed: CVE-2024-37079, CVE-2024-37080, CVE-2024-37081.
Updates are available in vCenter Server 8.0 U2d, 8.0 U1e, and 7.0 U3r; Cloud Foundation patches are accessible through KB88287.
VMware states that updating vCenter Server will not impact running workloads or VMs, though temporary unavailability of management interfaces is likely during the upgrade.
No active exploitation of these vulnerabilities has been detected, yet VMware urges updating immediately due to the risk of targeting by threat actors.
The company also identified an issue with custom ciphers in version 7.0 U3r, recommending a precheck.