VMware vCenter Server Bugs: Hackers’ New Favorite Playground!

Beware of cyber actors exploiting VMware vCenter Server bugs, CVE-2024-38812 and CVE-2024-38813. These vulnerabilities can lead to remote code execution and privilege escalation. VMware suggests updating to the latest patches to avoid any unwanted ‘surprises’ from malicious network packets. Stay safe and keep those servers patched!

Pro Dashboard

Hot Take:

VMware vCenter Server vulnerabilities are like the gift that keeps on giving… hackers everything they want. If you’re running this software, it might be time to update faster than your coffee maker can brew a pot, because these vulnerabilities are hotter than a stolen credit card on Black Friday!

Key Points:

  • Two critical vulnerabilities, CVE-2024-38812 and CVE-2024-38813, are being actively exploited.
  • Both vulnerabilities allow for remote code execution and privilege escalation in VMware vCenter Server.
  • The vulnerabilities were discovered by team TZL during the 2024 Matrix Cup contest.
  • Security patches have been released as vCenter Server 8.0 U3b and 7.0 U3s.
  • These vulnerabilities are reminiscent of similar issues patched earlier in June 2024.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here
The Nimble Nerd
Confessional Booth of Our Digital Sins

Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?