Hackers Gone Wild: Unpatched VMware and Progress Kemp Flaws Exploited!
Progress Kemp LoadMaster’s security flaw is like leaving the front door open with a “Welcome Hackers” sign. CVE-2024-1212 lets attackers waltz in and execute commands, earning a CVSS score of 10.0. Meanwhile, VMware vCenter Server isn’t doing much better, with vulnerabilities being exploited faster than you can say “patch update.”

Hot Take:
Looks like hackers found a way to turn “LoadMaster” into “Load Disaster”—all thanks to some unpatched vulnerabilities! It’s a classic case of “Oops, I did it again” for tech companies that thought their patches were perfect. Keep those updates coming, folks, or you might just get a front-row seat to the next cybersecurity circus!
Key Points:
- Progress Kemp LoadMaster and VMware vCenter Server are under active exploitation due to security flaws.
- CVE-2024-1212, a critical vulnerability in LoadMaster, was added to CISA’s Known Exploited Vulnerabilities catalog.
- VMware vCenter Server vulnerabilities, CVE-2024-38812 and CVE-2024-38813, are being actively targeted by attackers.
- Patches for these vulnerabilities were issued earlier but required further fixes.
- Sophos warns of a vulnerability in Veeam Backup & Replication being used to spread new ransomware.
Already a member? Log in here