[SECURITY-L] VMSA-2024-0019:VMware vCenter Server updates address heap-overflow and privilege escalation vulnerabilities (CVE-2024-38812, CVE-2024-38813)
CSIRT Unicamp
security em unicamp.br
Quinta Setembro 19 13:36:05 -03 2024
Product/Component
VMware Cloud Foundation
1 more products
Notification Id
24968
Last Updated
17 September 2024
Initial Publication Date
17 September 2024
Status
OPEN
Severity
CRITICAL
CVSS Base Score
7.5-9.8
WorkAround
Affected CVE
CVE-2024-38812, CVE-2024-38813
*Advisory ID:* VMSA-2024-0019
*Severity:* Critical
*CVSSv3 Range:* 7.5-9.8
*Synopsis:* VMware vCenter Server updates address heap-overflow and
privilege escalation vulnerabilities (CVE-2024-38812, CVE-2024-38813)
*Issue date:* 2024-09-17
*Updated on:* 2024-09-17 (Initial Advisory)
*CVE(s)* CVE-2024-38812, CVE-2024-38813
*1. Impacted Products*
- VMware vCenter Server
- VMware Cloud Foundation
*2. Introduction*
A heap-overflow vulnerability and a privilege escalation vulnerability in
vCenter Server were responsibly reported to VMware. Updates are available
to remediate these vulnerabilities in affected VMware products.
*3a**. VMware vCenter Server heap-overflow vulnerability (CVE-2024-38812*
*) *
*Description:*The vCenter Server contains a heap-overflow vulnerability in
the implementation of the DCERPC protocol. VMware has evaluated the
severity of this issue to be in the Critical severity range
<https://www.vmware.com/support/policies/security_response.html> with a
maximum CVSSv3 base score of 9.8
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>
.
*Known Attack Vectors:*A malicious actor with network access to vCenter
Server may trigger this vulnerability by sending a specially crafted
network packet potentially leading to remote code execution.
*Resolution:*To remediate CVE-2024-38812 apply the updates listed in the
'Fixed Version' column of the 'Response Matrix' below to affected
deployments.
*Workarounds:*In-product workarounds were investigated, but were determined
to not be viable.
*Additional Documentation:*A supplemental FAQ was created for additional
clarification. Please see: https://bit.ly/vcf-vmsa-2024-0019-qna
*Acknowledgments:*VMware would like to thank zbl & srs of team TZL working
with the 2024 Matrix Cup contest for reporting this issue to us.
*Notes:*None.
*3b. VMware vCenter privilege escalation vulnerability **(CVE-2024-38813) *
*Description:*The vCenter Server contains a privilege escalation
vulnerability. VMware has evaluated the severity of this issue to be
in the Important
severity range
<https://www.vmware.com/support/policies/security_response.html> with a
maximum CVSSv3 base score of 7.5
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H>
.
*Known Attack Vectors:*A malicious actor with network access to vCenter
Server may trigger this vulnerability to escalate privileges to root by
sending a specially crafted network packet.
*Resolution:*To remediate CVE-2024-38813 apply the updates listed in the
'Fixed Version' column of the 'Response Matrix' below to affected
deployments.
*Workarounds:*None.
*Additional Documentation:*A supplemental FAQ was created for additional
clarification. Please see: https://bit.ly/vcf-vmsa-2024-0019-qna
*Acknowledgments:*VMware would like to thank zbl & srs of team TZL working
with the 2024 Matrix Cup contest for reporting this issue to us.
*Notes:*None.
*Response Matrix: 3a & 3b*
*VMware Product* *Version* *Running On* *CVE* *CVSSv3* *Severity* *Fixed
Version* *Workarounds* *Additional Documentation*
vCenter Server 8.0 Any CVE-2024-38812, CVE-2024-38813 9.8
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>
, 7.5
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H>
Critical 8.0 U3b
<https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-vcenter-server-80u3b-release-notes/index.html>
None FAQ <https://bit.ly/vcf-vmsa-2024-0019-qna>
vCenter Server 7.0 Any CVE-2024-38812, CVE-2024-38813 9.8
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>
, 7.5
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H>
Critical 7.0 U3s
<https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3s-release-notes/index.html>
None FAQ <https://bit.ly/vcf-vmsa-2024-0019-qna>
VMware Cloud Foundation 5.x Any CVE-2024-38812, CVE-2024-38813 9.8
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>
, 7.5
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H>
Critical Async patch to 8.0 U3b
<https://knowledge.broadcom.com/external/article?legacyId=88287> None Async
Patching Guide: KB88287
<https://knowledge.broadcom.com/external/article?legacyId=88287>
VMware Cloud Foundation 4.x Any CVE-2024-38812, CVE-2024-38813 9.8
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H>
, 7.5
<https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H>
Critical Async patch to 7.0 U3s
<https://knowledge.broadcom.com/external/article?legacyId=88287> None Async
Patching Guide: KB88287
<https://knowledge.broadcom.com/external/article?legacyId=88287>
*4. References:*
*Fixed Version(s) and Release Notes:*
*VMware vCenter Server 8.0 U3b*Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5515
https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-vcenter-server-80u3b-release-notes/index.html
*VMware vCenter Server 7.0 U3s*Downloads and Documentation:
https://support.broadcom.com/web/ecx/solutiondetails?patchId=5513
https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-vcenter-server-70u3s-release-notes/index.html
*KB Articles:*
Cloud Foundation 5.x/4.x:
https://knowledge.broadcom.com/external/article?legacyId=88287
*Mitre CVE Dictionary Links:*
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38812
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38813
*FIRST CVSSv3 Calculator: *
CVE-2024-38812:
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
CVE-2024-38813:
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
*5. Change Log:*
*2024-09-17 VMSA-2024-0019*Initial security advisory.
*6. Contact:*
E-mail: vmware.psirt em broadcom.com
PGP key
https://knowledge.broadcom.com/external/article/321551
VMware Security Advisories
https://www.broadcom.com/support/vmware-security-advisories
VMware External Vulnerability Response and Remediation Policy
https://www.broadcom.com/support/vmware-services/security-response
VMware Lifecycle Support Phases
https://support.broadcom.com/group/ecx/productlifecycle
VMware Security Blog
https://blogs.vmware.com/security
X
https://x.com/VMwareSRC
Copyright 2024 Broadcom All rights reserved.
===
Computer Security Incident Response Team - CSIRT
Universidade Estadual de Campinas - Unicamp
Centro de Computacao - CCUEC
GnuPG Public Key: http://www.security.unicamp.br/security.asc [^]
Contato: +55 19 3521-2289 ou INOC-DBA: 1251*830
-------------- Próxima Parte ----------
Um anexo em HTML foi limpo...
URL: <http://www.listas.unicamp.br/pipermail/security-l/attachments/20240919/9f55023b/attachment-0001.html>
Mais detalhes sobre a lista de discussão SECURITY-L