Skip to content

VMWare added to CISA Known Exploited Catalog - 20240123001

Overview

VMWare have released a critical advisory relating to vulnerabilities affecting their vCenter Server and VMware Cloud Foundation products. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write, potentially leading to remote code execution.

What is vulnerable?

CVE ID Product(s) Affected Summary Severity CVSS
CVE-2023-34048 VMware vCenter Server 8.x versions before 8.0U1d, VMware vCenter Server 7.x versions before 7.0U30, VMware Cloud Foundation versions 5.x and 4.x without KB88287 An out-of-bounds write vulnerability Critical 9.8
CVE-2023-34056 VMware vCenter Server 8.x versions before 8.0U1d, VMware vCenter Server 7.x versions before 7.0U30, VMware Cloud Foundation versions 5.x and 4.x without KB88287 An out-of-bounds write vulnerability Moderate 4.3

What has been observed?

CISA added this vulnerability in their Known Exploited Vulnerabilities catalog. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.

Recommendation

The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):

Additional References