ADVISORY!

TLP : CLEAR

Date : 30/07/2024

REF NO : CERT / 2024/07/67

VMWare Products Multiple Vulnerabilities

Severity Level: Medium

Components Affected

  • VMware ESXi 7.0
  • VMware ESXi 8.0
  • VMware  vCenter Server 7.0
  • VMware  vCenter Server 8.0
  • VMware Cloud Foundation 4.x
  • VMware Cloud Foundation 5.x

Overview

Multiple vulnerabilities were identified in VMware products. An attacker could exploit some of these vulnerabilities to trigger denial of service and  security restriction bypass.

Note:

CVE-2024-37085 is being exploited in the wild, therefore, the risk level is rated as medium. It is related a domain group whose members are granted full administrative access to the ESXi hypervisor by default without proper validation. 

Description

VMware ESXi and vCenter Server are affected by several critical vulnerabilities that could lead to severe security risks. In ESXi, an authentication bypass vulnerability allows a malicious actor with sufficient Active Directory (AD) permissions to gain full access to an ESXi host by re-creating a previously deleted AD group (‘ESXi Admins’ by default). Additionally, ESXi has an out-of-bounds read vulnerability where a malicious actor with local administrative privileges on a virtual machine with an existing snapshot could trigger a denial-of-service condition on the host. Furthermore, vCenter Server is vulnerable to a denial-of-service attack, where a malicious actor with network access could create a denial-of-service condition, potentially disrupting services.

Impact

  • Denial of Service
  • Security Restriction Bypass

Solution/ Workarounds

Before installation of the software, please visit the vendor web-site for more details.

Reference

Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.

Sri Lanka Computer Emergency Readiness Team | Coordination Centre

Copyright © 2023 SRI LANKA CERT | CC