SB2023102504 - Multiple vulnerabilities in VMware vCenter Server
Published: October 25, 2023 Updated: September 4, 2024
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 2 secuirty vulnerabilities.
1) Out-of-bounds write (CVE-ID: CVE-2023-34048)
The vulnerability allows a remote attacker to compromise vulnerable system.
The vulnerability exists due to a boundary error within the DCERPC protocol implementation. A remote non-authenticated attacker can send a specially crafted RPC request to the vCenter Server, trigger an out-of-bounds write and execute arbitrary code on the target system.
Note, the vulnerability is being actively exploited in the wild since late 2021.
2) Improper access control (CVE-ID: CVE-2023-34056)
The vulnerability allows a remote user to gain unauthorized access to sensitive information.
The vulnerability exists due to improper access restrictions. A remote user can bypass implemented security restrictions and gain unauthorized access to sensitive information.
Remediation
Install update from vendor's website.
References
- https://www.vmware.com/security/advisories/VMSA-2023-0023.html
- https://www.zerodayinitiative.com/advisories/ZDI-23-1590/
- https://blog.sonicwall.com/en-us/2023/12/vmware-vcenter-dcerpc-dealloc-pointer-manipulation/
- https://www.mandiant.com/resources/blog/chinese-vmware-exploitation-since-2021
- https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/23677