{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2024-060.pdf"
    },
    "title": "Vulnerabilities in VMware Products",
    "serial_number": "2024-060",
    "publish_date": "18-06-2024 16:44:15",
    "description": "On June 17, 2024, VMware released fixes for three vulnerabilities affecting VMware vCenter Server and VMware Cloud Foundation. Two of these vulnerabilities are critical. Exploitation these vulnerabilities could allow a malicious actor to execute remote code or escalate privileges on the affected systems.<br>\n",
    "url_title": "2024-060",
    "content_markdown": "---\ntitle: 'Vulnerabilities in VMware Products'\nnumber: '2024-060'\nversion: '1.0'\noriginal_date: 'June 17, 2024'\ndate: 'June 18, 2024'\n---\n\n_History:_\n\n* _18/06/2024 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn June 17, 2024, VMware released fixes for three vulnerabilities affecting VMware vCenter Server and VMware Cloud Foundation. Two of these vulnerabilities are critical. Exploitation these vulnerabilities could allow a malicious actor to execute remote code or escalate privileges on the affected systems [1].\n\n# Technical Details\n\nThe vulnerabilities **CVE-2024-37079** and **CVE-2024-37080**, both with a CVSS score of 9.8, are heap-overflow vulnerabilities in the DCERPC protocol implementation. An attacker with network access to vCenter Server can exploit these vulnerabilities to execute remote code by sending a specially crafted network packet.\n\nThe vulnerability **CVE-2024-37081**, with a CVSS score of 7.8, is a local privilege escalation vulnerability caused by  `sudo` misconfiguration. An authenticated local user with non-administrative privileges can exploit this vulnerability to gain root privileges.\n\n# Affected Products\n\nThese vulnerabilities affect VMware vCenter Server 7.0 and 8.0, and VMware Cloud Foundation 4.x and 5.x [1].\n\n# Recommendations \n\nCERT-EU strongly recommends updating affected software to the latest versions by following the instructions given by the vendor.\n\n# References\n\n[1] <https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453>",
    "content_html": "<p><em>History:</em></p><ul><li><em>18/06/2024 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On June 17, 2024, VMware released fixes for three vulnerabilities affecting VMware vCenter Server and VMware Cloud Foundation. Two of these vulnerabilities are critical. Exploitation these vulnerabilities could allow a malicious actor to execute remote code or escalate privileges on the affected systems [1].</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerabilities <strong>CVE-2024-37079</strong> and <strong>CVE-2024-37080</strong>, both with a CVSS score of 9.8, are heap-overflow vulnerabilities in the DCERPC protocol implementation. An attacker with network access to vCenter Server can exploit these vulnerabilities to execute remote code by sending a specially crafted network packet.</p><p>The vulnerability <strong>CVE-2024-37081</strong>, with a CVSS score of 7.8, is a local privilege escalation vulnerability caused by <code>sudo</code> misconfiguration. An authenticated local user with non-administrative privileges can exploit this vulnerability to gain root privileges.</p><h2 id=\"affected-products\">Affected Products</h2><p>These vulnerabilities affect VMware vCenter Server 7.0 and 8.0, and VMware Cloud Foundation 4.x and 5.x [1].</p><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU strongly recommends updating affected software to the latest versions by following the instructions given by the vendor.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453\">https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}