VMware vCenter Vulnerabilities: When Patches Need Patching!
After Broadcom’s first fix flopped, VMware vCenter server bugs are now being exploited in the wild. The critical heap-overflow vulnerability, CVE-2024-38812, and the privilege escalation flaw, CVE-2024-38813, are prime targets for cyber miscreants, emphasizing the need for immediate attention to these VMware security holes.

Hot Take:
VMware’s vCenter server bugs are like the villain in a horror movie – you think they’re gone, but they just keep coming back for more! Broadcom’s first attempt at patching was as effective as using a Band-Aid on a sinking ship, but at least they’re trying. Let’s hope their latest update isn’t a sequel in the making. In the meantime, admins should probably keep a fire extinguisher handy for their server rooms.
Key Points:
- Two vCenter server bugs, CVE-2024-38812 and CVE-2024-38813, have been exploited in the wild.
- Broadcom’s initial patches in September were insufficient, leading to a second attempt in October.
- CVE-2024-38812 is a critical heap-overflow vulnerability with a 9.8 CVSS severity rating.
- CVE-2024-38813 is a privilege escalation vulnerability rated at 7.5 CVSS severity.
- Both vulnerabilities affect certain versions of vCenter Server and VMware Cloud Foundation.
Already a member? Log in here