VMware vCenter Under Siege: Patch Now or Face the Wrath of Cyber Villains!
Broadcom warns of attackers exploiting VMware vCenter Server vulnerabilities, including a critical remote code execution flaw. Hackers are having a field day with these vulnerabilities, so if you’re too busy to update your systems, remember: hackers will always find time to crash your party. Apply those patches!

Hot Take:
Looks like the hackers have been eagerly waiting in line for the latest vCenter patches like they’re the latest iPhone release. But instead of upgrades, they’re serving up exploits—proof that some tech enthusiasts are just in it for the hacks!
Key Points:
- Two VMware vCenter Server vulnerabilities are being actively exploited: a remote code execution (RCE) flaw and a privilege escalation flaw.
- The RCE vulnerability, CVE-2024-38812, stems from a heap overflow in the DCE/RPC protocol, affecting VMware vSphere and Cloud Foundation.
- The privilege escalation flaw, CVE-2024-38813, allows attackers to gain root access using specially crafted network packets.
- Broadcom released patches in September, but the original patch for CVE-2024-38812 was incomplete, necessitating a new update.
- No workarounds exist; affected users must apply the latest patches to secure their systems.
Already a member? Log in here