Security

Patches

VMware fixes critical RCE, make-me-root bugs in vCenter - for the second time

If the first patches don't work, try, try again


VMware has pushed a second patch for a critical, heap-overflow bug in the vCenter Server that could allow a remote attacker to fully compromise vulnerable systems after the first software update, issued last month, didn't work.

Plus, in the same security update, VMware fixed (again) a make-me-root flaw in vCenter that's pretty nasty, too. Both bugs were originally patched on September 17. But, as VMware owner Broadcom noted on Monday, the fixes "did not completely address" either CVE.

The first critical flaw, tracked as CVE-2024-38812, affects vCenter 7.0.3, 8.0.2, and 8.0.3, plus running any version of vSphere or VMware Cloud Foundation prior to the versions listed above. 

It garnered a 9.8 out of 10 CVSS score — and for good reason. It doesn't require any user interaction to exploit, and a miscreant could abuse this vulnerability by sending a specially crafted network packet, which could allow remote code execution (RCE).

Meanwhile, the second vCenter bug (CVE-2024-38813) earned a 7.5 CVSS rating. Someone with network access could send a specially crafted packet and then escalate privileges to root.

There are no workarounds for either. "All customers are strongly encouraged to apply the patches currently listed in the Response Matrix," Broadcom noted in its security advisory.

Put together, these flaws are especially concerning as they could allow an attacker to remotely execute code on a buggy system after exploiting CVE-2024-38812, and then use CVE-2024-38813 to gain administrative privileges. 

Plus, everyone from ransomware gangs to nation states loves to find holes in VMware systems because they are so widely used across organizations, giving attackers maximum bang for their buck.

Earlier this year, Mandiant warned that Chinese cyberspies had been abusing a different critical vCenter bug since late 2021.

According to a separate FAQ about both new vCenter holes, "Broadcom is not currently aware of exploitation 'in the wild.'" We'd suggest patching ASAP to keep it that way. 

Both bugs were originally discovered by Zbl and srs of Team TZL at Tsinghua University during the Matrix Cup Cyber Security Competition, held in June in China. ®

Send us news
2 Comments

Windows Themes zero-day bug exposes users to NTLM credential theft

Plus a free micropatch until Redmond fixes the flaw

Emergency patch: Cisco fixes bug under exploit in brute-force attacks

Who doesn't love abusing buggy appliances, really?

Microsoft SharePoint RCE flaw exploits in the wild – you've had 3 months to patch

Plus, a POC to make it extra easy for attackers

Wanted. Top infosec pros willing to defend Britain on shabby salaries

GCHQ job ads seek top talent with bottom-end pay packets

Veeam tests support for another VMware alternative: XCP-NG

As Gartner rates the contenders for those contemplating a move off Virtzilla, with Nutanix on top of the list

Critical default credential in Kubernetes Image Builder allows SSH root access

It's called leaving the door wide open – especially in Proxmox

Just how private is Apple's Private Cloud Compute? You can test it to find out

Also updates bug bounty program with $1M payout

VMware by Broadcom lifts storage allowances and prices for vSphere Foundation

This will both ease and exacerbate price concerns and competitive sniping

Five Eyes nations tell tech startups to take infosec seriously. Again

Only took 'em a year to dish up some scary travel advice, and a Secure Innovation … Placemat?

Sophos to snatch Secureworks in $859M buyout: Why fight when you can just buy?

Private equity giant Thoma Bravo adds another trophy to its growing collection

The billionaire behind Trump's 'unhackable' phone is on a mission to fight Tesla's FSD

Dan O'Dowd tells El Reg about the OS secrets and ongoing clash with Musk

Millions of Android and iOS users at risk from hardcoded creds in popular apps

Azure Blob Storage, AWS, and Twilio keys all up for grabs