VMware has rolled out updates to resolve a critical security vulnerability in vCenter Server that could facilitate remote code execution. This issue, referred to as CVE-2024-38812, has been rated with a CVSS score of 9.8 due to its association with a heap overflow in the DCE/RPC protocol. This vulnerability can be exploited by attackers who have network access to vCenter Server, enabling them to send specially crafted packets that could lead to remote code execution. Initially reported by researchers zbl and srs from team TZL during the Matrix Cup cybersecurity competition in China earlier this year, VMware (now part of Broadcom) has confirmed that the patches released on September 17, 2024, did not fully resolve the issues linked to CVE-2024-38812. Moreover, a separate vulnerability concerning privilege escalation has been identified as CVE-2024-38813, which is also present in vCenter Server. This issue is classified as important and carries a CVSS score of 7.5, allowing an attacker with network access to escalate their privileges to root by sending specially crafted packets. Updates are available for various versions of vCenter Server, including 8.0 U3d, 8.0 U2e, and 7.0 U3t. Asynchronous patches are also provided for VMware Cloud Foundation versions 5.x, 5.1.x, and 4.x. At this time, there are no known mitigations for these vulnerabilities. While there have been no confirmed instances of these vulnerabilities being exploited in the wild, it is strongly recommended that users update to the latest versions to mitigate potential risks. Additionally, a law enacted in July 2021 in China mandates that researchers report any vulnerabilities discovered within the country to both the government and the relevant manufacturers promptly. This raises concerns about the possibility of nation-state actors gathering and exploiting zero-day vulnerabilities.
Security researchers have identified a new variant of the SparkCat malware circulating on both the Apple App Store and Google Play Store, more than a year after its initial discove...
The European Union’s cybersecurity agency, CERT-EU, has attributed a significant cloud breach involving the European Commission to the TeamPCP threat group. The attack targeted t...
Microsoft has rolled out automatic updates for unmanaged Windows 11 24H2 Home and Pro edition devices to Windows 11 25H2, also known as the Windows 11 2025 Update. This transition ...