VMware patches remote make-me-root holes in vCenter Server, Cloud Foundation

Broadcom has emitted a pair of patches for vulnerabilities in VMware vCenter Server that a miscreant with network access to the software could exploit to completely commandeer a system. This also affects Cloud Foundation.

The first flaw, CVE-2024-38812, is a heap overflow vulnerability in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) system that could be exploited over the network to achieve remote code execution on unpatched systems. Corrupting the heap could allow an attacker to execute arbitrary code on the system. Broadcom rates it as a critical fix and it has a CVSS score of 9.8 out of 10.

The second one, CVE-2024-38813, is a privilege escalation flaw that ranks a CVSS score of 7.5 and one that VMware-owned Broadcom rates as important. Someone with network access to VMware's vulnerable software could exploit this to gain root privileges on the system.

We can imagine a miscreant with network access using CVE-2024-38812 to gain code execution on a box, and then using CVE-2024-38813 to step up to administrative control. This scenario isn't explicitly outlined in the advisory though Broadcom chose to pair the flaws together in its advisory today and FAQ.

Versions 7 and 8 of vCenter Server and versions 4 and 5 of VMware Cloud Foundation are at risk and Broadcom warns there is no practical workaround for these bugs. In other words, get patching.

The blunders are addressed in vCenter Server versions 8.0 U3b and 7.0 U3s, and Cloud Foundation with async patches to 8.0 U3b and 7.0 U3s.

The discovery of both flaws stemmed from the Matrix Cup Cyber Security Competition, held in June in China, which was organized by 360 Digital Security Group and Beijing Huayunan Information Technology Company. Over 1,000 teams competed to report holes in products for $2.75 million in prizes.

Zbl and srs of Team TZL at Tsinghua University were credited with discovering the bugs, which were disclosed to Broadcom to patch.

The team bagged the competition's Best Vulnerability Award, along with a $59,360 payday, showing once again that bug bounties and competitive hacking really work. ®

Search
About Us
Website HardCracked provides softwares, patches, cracks and keygens. If you have software or keygens to share, feel free to submit it to us here. Also you may contact us if you have software that needs to be removed from our website. Thanks for use our service!
IT News
Sep 19
Kelsey Hightower: If governments rely on FOSS, they should fund it

Interview Kubernetes doyen talks to The Reg about keeping coders coding

Sep 19
From AI experiments to enterprise success

Webinar Transforming GenAI pilots into production-ready solutions

Sep 19
With billions in UK govt IT contracts about to expire, get the next vendors to act right

Poor performers get renewals, new small outfits discouraged from bidding, say researchers

Sep 19
LinkedIn started harvesting people's posts for training AI without asking for opt-in

You'll have to opt out if you don't like it - EU and a few others excepted

Sep 18
California governor goes on AI law signing spree, but demurs on the big one

Newsom still worried about SB 1047's 'chilling effect' on AI industry tax dollar revenue innovation in California

Sep 18
Microsoft unveils Office LTSC 2024 for users that remain stubbornly offline

What do you mean you don't want Copilot and Microsoft 365 services?