• VMware forced to patch critical vCenter Server RCE flaw for a sec

    From TechnologyDaily@1337:1/100 to All on Wednesday, October 23, 2024 11:15:05
    VMware forced to patch critical vCenter Server RCE flaw for a second time following bad patch

    Date:
    Wed, 23 Oct 2024 10:10:26 +0000

    Description:
    There are no workarounds, and the company suggests applying the patch ASAP.

    FULL STORY ======================================================================

    VMware has been forced to release a second patch for a serious security vulnerability in its vCenter Server platform after an initial release failed to fix the issue.

    Users are advised to apply the fix immediately, since the identified flaws
    are quite dangerous and without a proper workaround.

    The good news is that there is currently no evidence of in-the-wild abuse, so perhaps the miscreants havent yet picked up on them. However, since there are no workarounds, and businesses are known to be slow with patching, its only a matter of time before they do. No workaround

    "All customers are strongly encouraged to apply the patches currently listed in the Response Matrix," the advisory reads.

    In mid-September 2024, VMware released a security advisory, claiming to have patched two flaws in vCenter Server that could have granted threat actors remote code execution (RCE) abilities. These flaws were tracked as CVE-2024-38812 and CVE-2024-38813.

    The former affects vCenter 7.0.3, 8.9.2, and 8.0.3, as well as all versions
    of vSphere or VMware Cloud Foundation prior to the ones listed above. It was given a severity score of 9.8 (critical) since it can be exploited without user interaction, and since it grants RCE capabilities to a threat actor sending a custom-built network packet.

    The latter, on the other hand, is a 7.5-severity flaw, granting root
    privilege escalation.

    According to The Register , these two flaws are particularly dangerous when chained together, since a threat actor could first remotely execute malicious code, and then gain administrative privileges for even more damage. Whats more, VMware systems are a popular target for ransomware operators and state-sponsored threat actors, given their omnipresence in the business
    world.

    Both vulnerabilities were first discovered by Team TZL at Tsinghua
    University, during the Matrix Cup Cyber Security Competition, held in China earlier this year, the publication added.

    Via The Register More from TechRadar Pro Mystery database containing sensitive info on 762,000 car-owners discovered by researchers Here's a list of the best firewalls today These are the best endpoint protection tools
    right now



    ======================================================================
    Link to news story: https://www.techradar.com/pro/security/vmware-forced-to-patch-critical-vcenter -server-rce-flaw-for-a-second-time-following-bad-patch


    --- Mystic BBS v1.12 A47 (Linux/64)
    * Origin: tqwNet Technology News (1337:1/100)