Broadcom has issued a critical security update for VMware vCenter Server to address a severe vulnerability identified as CVE-2024-38812. This flaw, with a CVSS score of 9.8, is a heap overflow vulnerability in the DCE/RPC protocol that could allow attackers with network access to execute remote code on affected systems. The vulnerability is similar to issues resolved earlier this year, specifically CVE-2024-37079 and CVE-2024-37080, which also posed remote code execution risks. The urgency of this update reflects the critical nature of the threat, making it imperative for all users to apply the patch without delay.
In addition to CVE-2024-38812, Broadcom has addressed another significant issue, CVE-2024-38813, which involves a privilege escalation flaw in vCenter Server. This vulnerability allows an attacker to escalate privileges to root by sending a specially crafted network packet, posing a serious security risk. Both vulnerabilities were discovered by security researchers zbl and srs of team TZL during the Matrix Cup cybersecurity competition in China earlier this year. The fixes for these vulnerabilities are included in VMware vCenter Server versions 8.0 U3b and 7.0 U3s, as well as VMware Cloud Foundation versions 5.x and 4.x.
Broadcom has stated that there are no known instances of these vulnerabilities being actively exploited, but the company strongly advises customers to update their installations to the latest versions to mitigate potential threats. The release of this patch underscores the importance of maintaining up-to-date software to protect against evolving cyber threats. The update aims to address critical memory management and corruption issues that could be leveraged by attackers to compromise VMware vCenter services.
This security development coincides with a broader advisory from the U.S. Cybersecurity and Infrastructure Security Agency (CISA) and the Federal Bureau of Investigation (FBI) emphasizing the need to address cross-site scripting (XSS) flaws. These vulnerabilities, if left unchecked, can enable attackers to inject malicious scripts into web applications, potentially leading to data manipulation, theft, or misuse. Organizations are encouraged to follow best practices for securing their systems and stay vigilant against emerging cybersecurity threats.