Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Malware & Threats

VMware Discloses Exploitation of Hard-to-Fix vCenter Server Flaw

The saga of VMWare’s critical CVE-2024-38812 vCenter Server bug has reached the “exploitation detected” stage.

The saga of VMware’s critical CVE-2024-38812 vCenter Server bug has reached the “exploitation detected” stage.

The difficult-to-fix vulnerability, first revealed at a Chinese hacking contest five months ago, is now being exploited in the wild, the company confirmed on Monday.  

The virtualization technology giant issued an urgent update to its VMSA-2024-0019 bulletin with an acknowledgement of the live attacks and a call-to-arms for customers to prioritize the deployment of available fixes.

“VMware by Broadcom confirmed that exploitation has occurred in the wild for CVE-2024-38812 and CVE-2024-38813,” the company said.

VMware did not share any additional details on the observed exploitation or indicators of compromise (IOCs) to help defenders hunt for signs of infection.

The CVE-2024-38812 flaw, which carries a CVSS severity score of 9.8/10, has been a public embarrassment for VMware.  Back in September, the company originally shipped a patch and credited research teams participating in the 2024 Matrix Cup, a hacking contest that took place in June and is sponsored by Chinese cybersecurity firm Qihoo 360 and Beijing Huayun’an Information Technology.  

Advertisement. Scroll to continue reading.

Four months later, the company was still struggling to patch the nasty bug, which exposes vCenter Server instances to remote code execution exploitation.

“VMware by Broadcom has determined that the vCenter patches released on September 17, 2024 did not fully address CVE-2024-38812,” the company said at the time. No additional details were provided.

The vulnerability is described as a heap-overflow in the Distributed Computing Environment / Remote Procedure Call (DCERPC) protocol implementation within vCenter Server.

A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution, VMware warned.

Related: VMware Struggles to Fix Flaw Exploited at Chinese Hacking Contest

Related: VMware Patches Code Execution Flaw Found in Chinese Hacking Contest

Related: VMware Patches High-Severity SQL Injection Flaw in HCX Platform 

Related: Chinese Spies Exploited VMware vCenter Server Vulnerability Since 2021

Related: $2.5 Million Offered at Upcoming ‘Matrix Cup’ Chinese Hacking Contest

Written By

Ryan Naraine is Editor-at-Large at SecurityWeek and host of the popular Security Conversations podcast series. He is a security community engagement expert who has built programs at major global brands, including Intel Corp., Bishop Fox and GReAT. Ryan is a founding-director of the Security Tinkerers non-profit, an advisor to early-stage entrepreneurs, and a regular speaker at security conferences around the world.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

MongoDB has appointed Doug Bowers as Chief Information Security Officer.

Ben Wilkens has been promoted to Director of Cybersecurity at NMFTA.

Cato Networks has appointed Meital Koren as Chief Legal Officer.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.