VMware has urgently addressed critical security vulnerabilities across its ESXi, Workstation, Fusion, and vCenter Server products in response to the latest advisory (VMSA-2024-0011.1), issued on May 21, 2024. These vulnerabilities pose significant risks, including out-of-bounds read/write flaws and authenticated remote code execution threats, affecting a broad spectrum of VMware platforms crucial for virtualized environments worldwide.
The out-of-bounds read/write vulnerability (CVE-2024-22273) impacts storage controllers in VMware ESXi, Workstation, and Fusion. Exploitation of this flaw could enable attackers to execute arbitrary code on the hypervisor or cause denial-of-service incidents. VMware has assigned this issue a critical severity rating with a maximum CVSSv3 base score of 8.1, underscoring the urgent need for mitigation.
Another critical concern, CVE-2024-22274, involves authenticated remote code execution in VMware vCenter Server. This vulnerability allows adversaries with administrative privileges on the vCenter appliance shell to execute arbitrary commands on the underlying operating system, posing significant risks to system integrity and security. It carries a maximum CVSSv3 base score of 7.2.Additionally, CVE-2024-22275 addresses a partial file read vulnerability in vCenter Server, which could potentially expose sensitive data to attackers leveraging administrative privileges.
Organizations are strongly advised to apply the prescribed patches and updates outlined in VMware’s response matrices promptly. These measures are essential to mitigate the identified vulnerabilities effectively, ensuring the resilience and security of VMware environments amidst evolving cyber threats. Proactive implementation of these security protocols is critical to safeguarding virtual infrastructures deployed across enterprises globally, maintaining operational continuity and data protection in virtualized environments.
Reference: