VMware Security Update – 18 September 2024

VMware has released a security update to address several vulnerabilities across multiple VMware products.

The addressed vulnerabilities could allow the attacker to execute buffer overflow attacks, gain elevated privileges, or execute arbitrary code and gain access to the affected systems.

Sample of the addressed vulnerabilities:

1. VMware vCenter Server Buffer Overflow Vulnerability (CVE-2024-38812):

  • CVSS: 9.8
  • Attack Vector: Network
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Access

2. VMware Fusion Code Execution Vulnerability (CVE-2024-38811):

  • CVSS: 8.8
  • Attack Vector: Local
  • Attack Complexity: Low
  • Privileges Required: None
  • User Interaction: None
  • Consequences: Gain Access

Affected products:

  • VMware vCenter Server.
  • VMware Cloud Foundation.
  • VMware Fusion.
Vulnerabilities
  • CVE-2024-38811
  • CVE-2024-38812
  • CVE-2024-38813
Mitigations

The enterprise should deploy this patch as soon as the testing phase is completed.

VMware Security Advisory

References