Hackers Gone Wild: Unpatched VMware and Progress Kemp Flaws Exploited!

Progress Kemp LoadMaster’s security flaw is like leaving the front door open with a “Welcome Hackers” sign. CVE-2024-1212 lets attackers waltz in and execute commands, earning a CVSS score of 10.0. Meanwhile, VMware vCenter Server isn’t doing much better, with vulnerabilities being exploited faster than you can say “patch update.”

Pro Dashboard

Hot Take:

Looks like hackers found a way to turn “LoadMaster” into “Load Disaster”—all thanks to some unpatched vulnerabilities! It’s a classic case of “Oops, I did it again” for tech companies that thought their patches were perfect. Keep those updates coming, folks, or you might just get a front-row seat to the next cybersecurity circus!

Key Points:

  • Progress Kemp LoadMaster and VMware vCenter Server are under active exploitation due to security flaws.
  • CVE-2024-1212, a critical vulnerability in LoadMaster, was added to CISA’s Known Exploited Vulnerabilities catalog.
  • VMware vCenter Server vulnerabilities, CVE-2024-38812 and CVE-2024-38813, are being actively targeted by attackers.
  • Patches for these vulnerabilities were issued earlier but required further fixes.
  • Sophos warns of a vulnerability in Veeam Backup & Replication being used to spread new ransomware.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?