{"uuid": "fc7366c3-e57b-457b-add5-4bfe5ae3a0c9", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2023-34048", "type": "seen", "source": "https://t.me/IntrusionExploit/285", "content": "Broadcom has discovered and fixed a critical vulnerability in VMware vCenter Server (CVE-2024-38812). This vulnerability allows attackers to execute code remotely on unpatched hosts by sending a specially crafted network packet.\n\nAttackers can exploit this vulnerability remotely, without authentication, through low-skill attacks.\n\nCVE-2024-38812 - Originates from a memory overflow vulnerability in vCenter's DCE/RPC implementation, affecting multiple products such as VMware vSphere and VMware Cloud Foundation.\n\nExperts recommend:\nUpdate now: Security patches are available through the standard vCenter Server update mechanism. To protect your organization, install the updated versions listed in the \"VMware Security Bulletin\".\nAccess Control: If you cannot apply the update immediately, strictly control edge access to vSphere management components.\nBroadcom has also confirmed that there are no known exploits of CVE-2023-34048 at this time. However, always be cautious and take additional security measures.\nAdditionally, Broadcom has patched another elevation of privilege vulnerability (CVE-2024-38813) that could allow an attacker to gain root access to an affected host.\nMake sure you take the necessary steps to protect your systems!", "creation_timestamp": "2024-09-19T08:05:25.000000Z"}