Share This:

Cybersecurity Threat Advisory

VMware has released patches to address critical vulnerabilities impacting Cloud Foundation, vCenter Server, and vSphere ESXi, which could be exploited to achieve privilege escalation and remote code execution. The flaws, identified as CVE-2024-37079, CVE-2024-37080, and CVE-2024-37081, have high CVSS scores. Users are urged to review this Cybersecurity Threat Advisory and apply the updates immediately to mitigate potential risks.

What is the threat?

This threat comprises of multiple critical vulnerabilities in VMware products. CVE-2024-37079 and CVE-2024-37080 are heap-overflow vulnerabilities in the DCE/RPC protocol implementation within vCenter Server. These vulnerabilities allow a malicious actor with network access to vCenter Server to achieve remote code execution by sending specially crafted network packets. This could lead to complete system compromise, allowing the attacker to execute arbitrary code and potentially gain full control over the affected system.

CVE-2024-37081 involves multiple local privilege escalation vulnerabilities in VMware vCenter due to the misconfiguration of sudo. An authenticated local user with non-administrative privileges could exploit these vulnerabilities to obtain root permissions, significantly increasing their access level and control over the system. This could lead to unauthorized changes, data exfiltration, and other malicious activities.

Why is it noteworthy?

The high CVSS scores of these vulnerabilities underscore the severity, indicating that successful exploitation could result in significant damage. The ability of threat actors to achieve remote code execution and escalate privileges poses a substantial risk to the confidentiality, integrity, and availability of affected systems. VMware users with these affected software should take prompt action to mitigate these threats and protect critical infrastructure.

What is the exposure or risk?

The risk posed by these vulnerabilities is considerable for organizations relying on VMware’s Cloud Foundation, vCenter Server, and vSphere ESXi. Exploitation of these vulnerabilities could lead potential data breaches, service disruptions, and significant financial and reputational damage. The ability to achieve remote code execution and escalate privileges allows attackers to move laterally within the network, increasing the potential impact of an attack.

What are the recommendations?

Barracuda MSP recommends the following actions to protect your VMware infrastructure:

  • Apply the patch versions listed in the VMware Security Advisory.
  • Refer to VMware’s documentation for instructions on patching and important considerations when deploying vCenter Server High Availability

References

For more in-depth information about the recommendations, please visit the following links:

If you have any questions about this Cybersecurity Threat Advisory, please contact Barracuda XDR’s Security Operations Center.


Share This:
Vincent Yu

Posted by Vincent Yu

Vincent is a Cybersecurity Analyst at Barracuda MSP. He's a security expert, working on our Blue Team within our Security Operations Center. Vincent supports our XDR service delivery and is highly skilled at analyzing security events to detect cyber threats, helping keep our partners and their customers protected.

Leave a reply

Your email address will not be published. Required fields are marked *