TRY NOW
Vulnerability

Broadcom Fixes Critical RCE in VMware vCenter Server

3 min. read
23/10/2024
By Laura Libeer
Vmware vcenter server vulnerability featured image

⚡ TL;DR | Go Straight to the VMware vCenter Server Vulnerability Audit Report

Broadcom has released an update for VMware vCenter Server addressing 2 new vulnerabilities, one of which is critical. If successfully exploited this heap-overflow vulnerability could allow an attacker to execute remote code via a network packet. We have added a new report to Lansweeper to help you identify any at-risk deployments of vCenter Server.

EDIT: On October 21st, Broadcom released new vCenter patches, as they determined that the patches released on the 17th of September did not fully address CVE-2024-38812. We have updated this article to reflect those new patches.

VMware vCenter Server Vulnerability CVE-2024-38812

The new VMware vCenter Server update includes fixes for 2 vulnerabilities, 1 of which is critical. The vulnerability tracked as CVE-2024-38812 received a critical CVSS score of 9.8. It is a heap-overflow vulnerability in the implementation of the DCERPC protocol. If successfully exploited a malicious actor with network access to vCenter Server could execute remote code by sending a specially crafted network packet. This could compromise confidential data, disrupt systems or even lead to theft or fraud.

The update also fixed a second vulnerability (CVE-2024-38813). This is a privilege escalation vulnerability with a CVSS score of 7.5 and could allow a malicious actor with network access to escalate privileges to root by sending a specially crafted network packet. You can find all the details in Broadcom’s advisory.

Update Vulnerable vCenter Server Deployments

Broadcom has released updates for vCenter Server 7.0 and 8.0, and VMware Cloud Foundation 5.x and 4.x. The updates are available through the usual channels and can also be found on Broadcom’s advisory page. Due to the critical nature of the issue, users are advised to update their deployment as soon as possible. There are no workarounds for these vulnerabilities.

EDIT: On the 22nd of October Broadcom released new patches for vCenter, as those released on the 17th of September did not adequately address CVE-2024-38812. The table below has been updated to reflect those new patches. Additionally, patches for the 8.0 U2 line are now also available.

VMware ProductAffected versionFixed version
vCenter Server 8.08.0 U3b
8.0 U2e 
vCenter Server 7.07.0 U3s
VMware Cloud Foundation5.xAsync patch to 8.0 U3b
VMware Cloud Foundation5.1.xAsync patch to 8.0 U2e 
VMware Cloud Foundation4.xAsync patch to 7.0 U3s

Discover At-Risk vCenter Server Deployments

Our team has created a new vulnerability report that you can use to locate any at-risk vCenter Server deployments in your network. This will give you an actionable list of devices that may be vulnerable and still require you to take action. Do note that this report only lists instances of vCenter Server, and not Cloud Foundation. You can get the report via the link below.

Run the VMware vCenter Server Vulnerability Audit

NO CREDIT CARD REQUIRED

Ready to get started?
You’ll be up and running in no time.

Explore all our features, free for 14 days.