Critical VMware vCenter Flaws: Patch Now or Risk Exploitation

Lilu Anderson
Photo: Finoracle.net

Multiple VMware vCenter Server Flaws Allow Remote Code Execution

Key Takeaway: Critical VMware vCenter Server vulnerabilities can potentially allow hackers to execute remote code. Immediate action required.

Critical Security Advisory VMSA-2024-0012

VMware has released a critical security advisory addressing several dangerous vulnerabilities in VMware vCenter Server, a crucial component of VMware vSphere and VMware Cloud Foundation. These flaws, if exploited, could enable attackers to run malicious code on affected systems.

Severe Vulnerabilities Identified

The security issues identified include heap overflow and local privilege escalation problems. These vulnerabilities are categorized as extremely severe with CVSSv3 base scores of up to 9.8.

Highlighted Vulnerabilities:

  • Heap Overflow Vulnerabilities (CVE-2024-37079, CVE-2024-37080)
  • Local Privilege Escalation Vulnerability (CVE-2024-37081)

Heap Overflow Vulnerabilities (CVE-2024-37079, CVE-2024-37080)

The heap overflow vulnerabilities exist in the DCERPC protocol of vCenter Server. These flaws could be exploited by attackers sending specific network packets, potentially leading to remote code execution.

Patch: VMware has released updates to rectify these vulnerabilities. Users should update their systems with the patches listed in the 'Fixed Version' column of the response matrix.

Local Privilege Escalation Vulnerability (CVE-2024-37081)

This vulnerability results from a misconfiguration in sudo, allowing non-admin local users to elevate to root privileges. This has a CVSSv3 base score of 7.8, indicating it is important.

Patch: Updates have been made available to fix this issue. Users should apply the necessary patches listed in the response matrix.

Response Matrix

| VMware Product | Version | Running On | CVE | CVSSv3 Severity | Fixed Version | Workarounds | Additional Documentation |
| — | — | — | — | — | — | — | — |
| vCenter Server | 8.0 | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.8, 9.8, 7.8 | Critical 8.0 U2d | None | FAQ |
| vCenter Server | 8.0 | Any | CVE-2024-37079, CVE-2024-37080 | 9.8, 9.8 | Critical 8.0 U1e | None | FAQ |
| vCenter Server | 7.0 | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.8, 9.8, 7.8 | Critical 7.0 U3r | None | FAQ |

Impacted Product Suites

| VMware Product | Version | Running On | CVE | CVSSv3 Severity | Fixed Version | Workarounds | Additional Documentation |
| — | — | — | — | — | — | — | — |
| Cloud Foundation (vCenter Server) | 5.x | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.8, 9.8, 7.8 | Critical KB88287 | None | FAQ |
| Cloud Foundation (vCenter Server) | 4.x | Any | CVE-2024-37079, CVE-2024-37080, CVE-2024-37081 | 9.8, 9.8, 7.8 | Critical KB88287 | None | FAQ |

Action Required: Apply Patches Immediately

Organizations using VMware vCenter Server are strongly urged to apply the necessary patches promptly to mitigate these critical vulnerabilities.

How to Verify Patches

To ensure patches are properly applied, follow these steps:

  1. Access the Appliance Shell:

    • Log in as a root user to the vCenter Server Appliance shell.
  2. List Installed Patches:

    • Use the command:
      software-packages list
      
    • To view patches by installation date:
      software-packages list --history
      
  3. Check Specific Patch Details:

  • Use the command:
    software-packages list --patch <patch_name>
    
  • Replace <patch_name> with the actual patch name (e.g., VMware-vCenter-Server-Appliance-Patch1).
  1. Use the vCenter Server Management Interface (VAMI):

    • Log in to the VAMI using root account.
    • Navigate to the “Update” section to see the current version and installed updates.
  2. Verify System Functionality:

    • Ensure that the vCenter Server Appliance functions correctly after applying patches by checking critical services and routine operations.

By following these steps, organizations can confirm that the latest security patches are in place, keeping their systems secure and up-to-date.

Share This Article
Lilu Anderson is a technology writer and analyst with over 12 years of experience in the tech industry. A graduate of Stanford University with a degree in Computer Science, Lilu specializes in emerging technologies, software development, and cybersecurity. Her work has been published in renowned tech publications such as Wired, TechCrunch, and Ars Technica. Lilu’s articles are known for their detailed research, clear articulation, and insightful analysis, making them valuable to readers seeking reliable and up-to-date information on technology trends. She actively stays abreast of the latest advancements and regularly participates in industry conferences and tech meetups. With a strong reputation for expertise, authoritativeness, and trustworthiness, Lilu Anderson continues to deliver high-quality content that helps readers understand and navigate the fast-paced world of technology.