web analytics

VMware patches security vulnerability twice – Source: www.csoonline.com

Rate this post

Source: www.csoonline.com – Author:

News

23 Oct 20242 mins

CyberattacksVulnerabilitiesZero-day vulnerability

VMware fixes remote code execution vulnerability in vCenter twice within a few months.

Mistakes can occur, but when the same problem occurs several times in a row, there may be a deeper problem. This is the case with VMware that had to publish a patch for the same security time for the second time in just a few months.

Heap overflow found in VMware vCenter

This patch is intended to fix a dangerous vulnerability in the company’s vCenter server platform. The remote code execution vulnerability was first documented and exploited in June during a Chinese hacking competition.

A few days ago, however, the company had to admit in a statement that the vCenter patches released on September 17, 2024 could not completely close the security vulnerability CVE-2024-38812.

The vulnerability is a heap overflow in the implementation of the DCERPC (distributed computing environment / remote procedure call) protocol in vCenter Server. An attacker with network access to vCenter server can trigger them by sending a specially crafted network packet, which can then lead to a remote code execution. That’s why the vulnerability is so dangerous and is rated with a CVSS severity rating of 9.8/10.

Hackers from China found the vulnerability

When the first patch was released in September 2024, VMware attributed the discovery of the issues to research teams participating in the 2024 Matrix Cup, a hacking competition in China that uncovers zero-days in major operating system platforms, smartphones, enterprise software, browsers and security products.

The Matrix Cup competition took place in June 2024 and is sponsored by Chinese cybersecurity firm Qihoo 360 and Beijing Huayun’an Information Technology.

Under Chinese law, zero-day vulnerabilities found by citizens must be immediately reported to the government. The details of a security vulnerability may not be sold or shared with anyone other than the manufacturer of the product.

Not the only recent mishap

The new patch for vCenter server also covers vulnerability CVE-2024-38813, an escalation of privilege flaw with a CVSS severity of 7.5/10. VMware warned that a malicious actor with network access to vCenter server could exploit this vulnerability to escalate privileges to root by also sending a specially crafted network packet.

SUBSCRIBE TO OUR NEWSLETTER

From our editors straight to your inbox

Get started by entering your email address below.

More from this author

Show me more

Original Post url: https://www.csoonline.com/article/3583542/vmware-patches-security-vulnerability-twice.html

Category & Tags: Cyberattacks, Vulnerabilities, Zero-day vulnerability – Cyberattacks, Vulnerabilities, Zero-day vulnerability

Views: 5

LinkedIn
Twitter
Facebook
WhatsApp
Email

advisor pick´S post