vCenter Server Heap Overflow Vulnerability

CVE-2024-37079
9.8CRITICAL

Key Information

Vendor
VMware
Status
Vmware Vcenter Server
Vmware Cloud Foundation
Vendor
CVE Published:
18 June 2024

Badges

šŸ˜„ TrendedšŸ“° News Worthy

Summary

The vCenter Server contains multiple critical vulnerabilities (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) that could potentially lead to remote code execution. These vulnerabilities are related to heap-overflow vulnerabilities in the implementation of the DCERPC protocol and local privilege escalation vulnerabilities due to misconfiguration of sudo, posing a high severity risk to users. While the vulnerabilities have not been exploited in the wild, VMware urges customers to install available patches immediately to address the issues. Patches are available for vCenter Server v 8.0, v 7.0, and Cloud Foundation versions 4.x and 5.x. There are no workarounds available, but VMware has stated that organizations may have other mitigations and compensating controls depending on their security posture and configurations of perimeter and appliance firewalls. These vulnerabilities have been responsibly reported by security researchers, and it is important for customers to take action to mitigate the risk of potential exploitation.

Affected Version(s)

VMware vCenter Server < 8.0 U2d

VMware vCenter Server < 8.0 U1e

VMware vCenter Server < 7.0 U3r

News Articles

CVSS V3.1

Score:
9.8
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability started trending.

  • First article discovered by CybersecurityNews

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database7 News Article(s)
.