VMware vCenter Server Bugs: Hackers’ New Favorite Playground!
Beware of cyber actors exploiting VMware vCenter Server bugs, CVE-2024-38812 and CVE-2024-38813. These vulnerabilities can lead to remote code execution and privilege escalation. VMware suggests updating to the latest patches to avoid any unwanted ‘surprises’ from malicious network packets. Stay safe and keep those servers patched!

Hot Take:
VMware vCenter Server vulnerabilities are like the gift that keeps on giving… hackers everything they want. If you’re running this software, it might be time to update faster than your coffee maker can brew a pot, because these vulnerabilities are hotter than a stolen credit card on Black Friday!
Key Points:
- Two critical vulnerabilities, CVE-2024-38812 and CVE-2024-38813, are being actively exploited.
- Both vulnerabilities allow for remote code execution and privilege escalation in VMware vCenter Server.
- The vulnerabilities were discovered by team TZL during the 2024 Matrix Cup contest.
- Security patches have been released as vCenter Server 8.0 U3b and 7.0 U3s.
- These vulnerabilities are reminiscent of similar issues patched earlier in June 2024.
Already a member? Log in here