VMware has launched software program updates to handle an already patched security flaw in vCenter Server that would pave the best way for distant code execution.
The vulnerability, tracked as CVE-2024-38812 (CVSS rating: 9.8), considerations a case of heap-overflow vulnerability within the implementation of the DCE/RPC protocol.
“A malicious actor with community entry to vCenter Server could set off this vulnerability by sending a specifically crafted community packet probably resulting in distant code execution,” Broadcom-owned virtualization companies supplier mentioned.
The flaw was initially reported by zbl and srs of staff TZL on the Matrix Cup cybersecurity competitors held in China earlier this 12 months.
“VMware by Broadcom has decided that the vCenter patches launched on September 17, 2024 didn’t absolutely tackle CVE-2024-38812,” the corporate famous.
Patches for the flaw can be found within the beneath vCenter Server variations –
- 8.0 U3d
- 8.0 U2e, and
- 7.0 U3t
It is also out there as an asynchronous patch for VMware Cloud Basis variations 5.x, 5.1.x, and 4.x. There are not any recognized mitigations.
Whereas there isn’t a proof that the vulnerability has been ever exploited within the wild, customers are suggested to replace to the newest variations to safeguard in opposition to potential threats.
In July 2021, China handed a legislation that requires vulnerabilities found by researchers within the nation to be promptly disclosed to the federal government and the product’s producer, elevating considerations that it may assist nation-state adversaries stockpile zero-days and weaponize them to their benefit.