Thursday , April 3 2025
VMware

VMware Patche vCenter Server, Cloud Foundation and vSphere ESXi

VMware has fixed critical security flaws in Cloud Foundation, vCenter Server, and vSphere ESXi. These flaws could be used for privilege escalation and remote code execution.

Vulnerabilities include:

CVE-2024-37079 & CVE-2024-37080 (CVSS scores: 9.8):

Multiple heap-overflow vulnerabilities in the implementation of the DCE/RPC protocol that could allow an unauthorized individual with network access to vCenter Server to achieve remote code execution by exploiting a specifically crafted network packet.

CVE-2024-37081 (CVSS score: 7.8):

Multiple sudo misconfiguration vulnerabilities in VMware vCenter that an authenticated local user with non-administrative privileges could exploit to obtain root permissions.

QiAnXin LegendSec researchers Hao Zheng and Zibo Li found and reported CVE-2024-37079 and CVE-2024-37080. Matei “Mal” Badanoiu from Deloitte Romania discovered CVE-2024-37081.

The issues in vCenter Server versions 7.0 and 8.0 have been fixed in versions 7.0 U3r, 8.0 U1e, and 8.0 U2d.

Although there are no reports of the vulnerabilities being exploited, it’s important for users to quickly apply the patches due to their critical nature.

Check Also

200 million

Over 200 Million Info Leaked Online Allegedly Belonging to X

Safety Detectives’ Cybersecurity Team found a forum post where a threat actor shared a .CSV …

Leave a Reply

Your email address will not be published. Required fields are marked *

Trending Threat Actor: Lockbit, Lazarus, Blackcat, Cybercriminals, SaltTyphoon, Scttered Spider, RedGolf, BlueBravo, North Korean Hackers, ...
Trending Malware: SocGholish, Colabtstrike, Linuxkernel, Plugx, Lockbit, Xmrig, REMCOM RAT, Play Ransomware, LummaC2, HijackLoader, BugSleep
Trending vulnerability:CVE: 2024-21887, CVE: 2024-6387, CVE: 2024-46805, CVE: 2017-11882, CVE: 2021-44228, CVE:2024-40348, CVE: 2024-38112
Techniques: T1059.001, T1082, T1486, T1190, T1083
Tactics: TA0007, TA0001, TA0005, TA0011
15:53