{"id":23267,"date":"2023-10-30T17:10:47","date_gmt":"2023-10-31T01:10:47","guid":{"rendered":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16997\/"},"modified":"2023-10-30T17:10:47","modified_gmt":"2023-10-31T01:10:47","slug":"news-16997","status":"publish","type":"post","link":"https:\/\/www.palada.net\/index.php\/2023\/10\/30\/news-16997\/","title":{"rendered":"Update vCenter Server now! VMWare fixes critical vulnerability"},"content":{"rendered":"\n<p>VMWare has&nbsp;<a href=\"https:\/\/www.vmware.com\/security\/advisories\/VMSA-2023-0023.html\" target=\"_blank\" rel=\"noreferrer noopener\">issued an update<\/a>&nbsp;to address one out-of-bounds write and one information disclosure vulnerability in its server management software, vCenter Server.<\/p>\n<p>Since there are no in-product workarounds, customers are advised to apply the updates urgently.<\/p>\n<p>The affected products are VMware vCenter Server versions 7.0 and 8.0 &nbsp;and VMware Cloud Foundation versions 5.x and 4.x.<\/p>\n<p>The Common Vulnerabilities and Exposures (CVE) database lists publicly disclosed computer security flaws. The CVEs patched in these updates are CVE-2023-34048 and CVE-2023-34056.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-34048\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-34048<\/a>, an out-of-bounds write vulnerability in the vCenter Server&#8217;s implementation of the DCERPC protocol. A malicious actor with network access to could trigger an out-of-bounds write, potentially leading to remote code execution (RCE). The vulnerability has a&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2020\/05\/how-cvss-works-characterizing-and-scoring-vulnerabilities\">CVSS<\/a>&nbsp;score of 9.8 out of 10.<\/p>\n<p>DCE\/RPC, which is short for &#8220;Distributed Computing Environment \/ Remote Procedure Calls&#8221;, is the remote procedure call system developed to allow programmers to write distributed software as if it were all working on the same computer, without having to worry about the underlying network code.<\/p>\n<p>An out-of-bounds write or read flaw makes it possible to manipulate parts of the memory which are allocated to more critical functions. This could allow an attacker to write code to a part of the memory where it will be executed with permissions that the program and user should not have.<\/p>\n<p>VMware is not currently aware of exploitation \u201cin the wild,\u201d but urges customers to considered this an emergency change, and your organization should consider acting quickly.<\/p>\n<p><a href=\"https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2023-34056\" target=\"_blank\" rel=\"noreferrer noopener\">CVE-2023-34056<\/a>, a partial information disclosure vulnerability. A malicious actor with non-administrative privileges to vCenter Server could use this issue to access unauthorized data. It has a CVSS score 4.3 out of 10.<\/p>\n<h2 class=\"wp-block-heading\" id=\"h-patching\">Patching<\/h2>\n<p>While VMware normally does not mention end-of-life products in VMware Security Advisories, due to the critical severity of this vulnerability and the lack of a workaround, VMware has made a patch generally available for vCenter Server 6.7U3, 6.5U3, and VCF 3.x. For the same reasons, VMware has made additional patches available for vCenter Server 8.0U1.<\/p>\n<p><strong>Fixed version(s) and release notes:<\/strong><\/p>\n<p><strong>VMware vCenter Server 8.0U2<\/strong><br \/>Downloads and Documentation:<br \/><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VC80U2&amp;productId=1345&amp;rPId=110105\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VC80U2&amp;productId=1345&amp;rPId=110105<\/a><\/p>\n<p><strong>VMware vCenter Server 8.0U1d<\/strong><br \/>Downloads and Documentation:<br \/><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VC80U1D&amp;productId=1345&amp;rPId=112378\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VC80U1D&amp;productId=1345&amp;rPId=112378<\/a><\/p>\n<p><strong>VMware vCenter Server 7.0U3o<br \/>Downloads and Documentation:<br \/><a href=\"https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VC70U3O&amp;productId=974&amp;rPId=110262\">https:\/\/customerconnect.vmware.com\/downloads\/details?downloadGroup=VC70U3O&amp;productId=974&amp;rPId=110262<\/a><\/strong><\/p>\n<p><strong>Cloud Foundation 5.x\/4.x<br \/><a href=\"https:\/\/kb.vmware.com\/s\/article\/88287\" target=\"_blank\" rel=\"noreferrer noopener\">https:\/\/kb.vmware.com\/s\/article\/88287<\/a><\/strong><\/p>\n<p>VMWare also published an&nbsp;<a href=\"https:\/\/core.vmware.com\/resource\/vmsa-2023-0023-questions-answers\" target=\"_blank\" rel=\"noreferrer noopener\">FAQ about this update<\/a>.<\/p>\n<hr class=\"wp-block-separator has-text-color has-cyan-bluish-gray-color has-alpha-channel-opacity has-cyan-bluish-gray-background-color has-background is-style-wide\" \/>\n<p><strong>We don\u2019t just report on vulnerabilities\u2014we identify them, and prioritize action.<\/strong><\/p>\n<p>Cybersecurity risks should never spread beyond a headline. Keep vulnerabilities in tow by using&nbsp;<a href=\"https:\/\/www.malwarebytes.com\/business\/vulnerability-patch-management\">Malwarebytes Vulnerability and Patch Management<\/a>.<\/p>\n<p><a href=\"https:\/\/www.malwarebytes.com\/blog\/news\/2023\/10\/update-vcenter-server-now-vmware-fixes-critical-vulnerability\" target=\"bwo\" >https:\/\/blog.malwarebytes.com\/feed\/<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p> VMWare has&#160;issued an update&#160;to address one out-of-bounds write and one information disclosure vulnerability in its server management software, vCenter Server. Since&#8230; <\/p>\n","protected":false},"author":4,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"colormag_page_container_layout":"default_layout","colormag_page_sidebar_layout":"default_layout","footnotes":""},"categories":[10488,10378],"tags":[1001,30399,30398,30400,22783,12135,32,28258,11682,30397,14138],"class_list":["post-23267","post","type-post","status-publish","format-standard","hentry","category-malwarebytes","category-security","tag-business","tag-cve-2023-34048","tag-cve-2023-34056","tag-dce-rpc","tag-exploits-and-vulnerabilities","tag-information-disclosure","tag-news","tag-out-of-bounds-write","tag-remote-code-execution","tag-vcenter-server","tag-vmware"],"_links":{"self":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23267","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/comments?post=23267"}],"version-history":[{"count":0,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/posts\/23267\/revisions"}],"wp:attachment":[{"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/media?parent=23267"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/categories?post=23267"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.palada.net\/index.php\/wp-json\/wp\/v2\/tags?post=23267"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}