• Menu
  • Skip to main content
  • Skip to primary sidebar

The Cyber Security News

Latest Cyber Security News

Header Right

  • Latest News
  • Vulnerabilities
  • Cloud Services
act now: vmware releases patch for critical vcenter server rce

Act Now: VMware Releases Patch for Critical vCenter Server RCE Vulnerability

You are here: Home / General Cyber Security News / Act Now: VMware Releases Patch for Critical vCenter Server RCE Vulnerability
October 25, 2023

VMware has produced security updates to tackle a critical flaw in the vCenter Server that could end result in distant code execution on afflicted units.

The issue, tracked as CVE-2023-34048 (CVSS rating: 9.8), has been explained as an out-of-bounds compose vulnerability in the implementation of the DCE/RPC protocol.

“A destructive actor with network obtain to vCenter Server may perhaps result in an out-of-bounds produce possibly foremost to remote code execution,” VMware mentioned in an advisory posted these days.

✔ Approved From Our Partners
AOMEI Backupper Lifetime

Protect and backup your data using AOMEI Backupper. AOMEI Backupper takes secure and encrypted backups from your Windows, hard drives or partitions. With AOMEI Backupper you will never be worried about loosing your data anymore.

Get AOMEI Backupper with 72% discount from an authorized distrinutor of AOMEI: SerialCart® (Limited Offer).

➤ Activate Your Coupon Code


Cybersecurity

Credited with discovering and reporting the flaw is Grigory Dorodnov of Pattern Micro Zero Working day Initiative.

VMware claimed that there are no workarounds to mitigate the shortcoming and that security updates have been built obtainable in the subsequent versions of the application –

  • VMware vCenter Server 8. (8.0U1d or 8.0U2)
  • VMware vCenter Server 7. (7.0U3o)
  • VMware Cloud Basis 5.x and 4.x

Provided the criticality of the flaw and the lack of short-term mitigations, the virtualization services company stated it’s also earning readily available a patch for vCenter Server 6.7U3, 6.5U3, and VCF 3.x.

Cybersecurity

The latest update further more addresses CVE-2023-34056 (CVSS score: 4.3), a partial details disclosure vulnerability impacting the vCenter Server that could help a undesirable actor with non-administrative privileges to entry unauthorized data.

VMware, in a independent FAQ, reported it can be not conscious of in-the-wild exploitation of the flaws, but has encouraged clients to act swiftly to implement the patches as soon as achievable to mitigate any potential threats.

Observed this posting fascinating? Observe us on Twitter  and LinkedIn to browse much more special written content we article.


Some parts of this short article are sourced from:
thehackernews.com

Previous Post: «malvertising campaign targets brazil's pix payment system with gopix malware Malvertising Campaign Targets Brazil’s PIX Payment System with GoPIX Malware
Next Post: The Rise of S3 Ransomware: How to Identify and Combat It the rise of s3 ransomware: how to identify and combat»

Reader Interactions

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Primary Sidebar

Report This Article

Recent Posts

  • BREAKING: 7,000-Device Proxy Botnet Using IoT, EoL Systems Dismantled in U.S. – Dutch Operation
  • OtterCookie v4 Adds VM Detection and Chrome, MetaMask Credential Theft Capabilities
  • Initial Access Brokers Target Brazil Execs via NF-e Spam and Legit RMM Trials
  • Deploying AI Agents? Learn to Secure Them Before Hackers Strike Your Business
  • Malicious npm Packages Infect 3,200+ Cursor Users With Backdoor, Steal Credentials
  • Beyond Vulnerability Management – Can You CVE What I CVE?
  • Google Rolls Out On-Device AI Protections to Detect Scams in Chrome and Android
  • Chinese Hackers Exploit SAP RCE Flaw CVE-2025-31324, Deploy Golang-Based SuperShell
  • 38,000+ FreeDrain Subdomains Found Exploiting SEO to Steal Crypto Wallet Seed Phrases
  • SonicWall Patches 3 Flaws in SMA 100 Devices Allowing Attackers to Run Code as Root

Copyright © TheCyberSecurity.News, All Rights Reserved.