VMware vCenter Server Remote Code Execution Vulnerability
CVE-2024-22274

7.2HIGH

Key Information:

Badges

👾 Exploit Exists🟡 Public PoC📰 News Worthy

Summary

The vulnerability identified as CVE-2024-22274 affects VMware vCenter Server and allows a malicious actor with administrative privileges to run arbitrary commands on the underlying operating system. The vulnerability has been exploited and a proof-of-concept (PoC) exploit has been released, potentially allowing remote code execution. This poses a serious risk as it can give attackers full control of the affected system. The vulnerability affects specific API components and arbitrary commands can be executed with root privileges. VMware has recommended applying updates to the affected deployments and emphasizes the importance of maintaining up-to-date security measures in virtualization environments. Currently, no workarounds are available, and organizations are urged to assess their systems and apply the necessary updates to mitigate the risk of potential exploitation.

Affected Version(s)

VMware Cloud Foundation (vCenter Server) 5.x < 5.1.1

VMware Cloud Foundation (vCenter Server) 4.x

VMware vCenter Server 8.0 < 8.0 U2b

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVE-2024-22274 | AttackerKB

The vCenter Server contains an authenticated remote code execution vulnerability. A malicious actor with administrative privileges on the vCenter appliance she…

6 months ago

L’exploit POC per l’RCE di VMware vCenter Server è ora disponibile Online!

Disponibile l'exploit pubblico per la RCE su L’exploit POC per l’RCE di VMware vCenter per eseguire comandi arbitrari con privilegi di root.

6 months ago

PoC Exploit Released for VMware vCenter Server RCE Vulnerability

A proof-of-concept (PoC) exploit has been released for a critical vulnerability in the VMware vCenter Server, potentially allowing authenticated remote code execution.

6 months ago

References

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 📰

    First article discovered by CybersecurityNews

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.