Skip to main content

Broadcom Releases Critical Security Updates for VMware vCenter Server and Cloud Foundation

Advisory addresses three vulnerabilities that could result in privilege escalation or remote code execution

Report a cyber attack: call 0300 303 5222 or email [email protected]

Summary

Advisory addresses three vulnerabilities that could result in privilege escalation or remote code execution


Threat details

Introduction

Broadcom has issued an advisory addressing three security vulnerabilities in VMware vCenter Server, the centralised management utility for virtual machines and hosts, and VMware Cloud Foundation, the private cloud platform.


Vulnerability details

  • CVE-2024-37079 is a heap-overflow vulnerability in VMware vCenter Server with a CVSSv3 score of 9.8. A malicious attacker with network access to vCenter Server could trigger this vulnerability by sending a specially crafted network packet, potentially leading to remote code execution.
  • CVE-2024-37080 is also a heap-overflow vulnerability in VMware vCenter Server with a CVSSv3 score of 9.8. A malicious attacker with network access to vCenter Server could trigger this vulnerability by sending a specially crafted network packet, potentially leading to remote code execution.

  • CVE-2024-37081 is a privilege escalation vulnerability in vCenter Server with a CVSSv3 score of 7.8. An authenticated local attacker with non-administrative privileges could exploit these issues to elevate privileges to root on vCenter Server Appliance.

Proof-of-concept exploit code has been published for CVE-2024-37081

Proof-of-concept exploit code for CVE-2024-37081 has been publicly released. Exploitation is considered more likely.


Threat updates

Date Update
9 Jul 2024 Proof-of-concept released for exploitation of CVE-2024-37081

Remediation advice

Affected organisations are encouraged to review Broadcom's VMware advisory VMSA-2024-0012 and apply the relevant updates.



Last edited: 9 July 2024 3:02 pm