VMWare added to CISA Known Exploited Catalog - 20240123001¶
Overview¶
VMWare have released a critical advisory relating to vulnerabilities affecting their vCenter Server and VMware Cloud Foundation products. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write, potentially leading to remote code execution.
What is vulnerable?¶
CVE ID | Product(s) Affected | Summary | Severity | CVSS |
---|---|---|---|---|
CVE-2023-34048 | VMware vCenter Server 8.x versions before 8.0U1d, VMware vCenter Server 7.x versions before 7.0U30, VMware Cloud Foundation versions 5.x and 4.x without KB88287 | An out-of-bounds write vulnerability | Critical | 9.8 |
CVE-2023-34056 | VMware vCenter Server 8.x versions before 8.0U1d, VMware vCenter Server 7.x versions before 7.0U30, VMware Cloud Foundation versions 5.x and 4.x without KB88287 | An out-of-bounds write vulnerability | Moderate | 4.3 |
What has been observed?¶
CISA added this vulnerability in their Known Exploited Vulnerabilities catalog. There is no evidence of exploitation affecting Western Australian Government networks at the time of publishing.
Recommendation¶
The WA SOC recommends administrators apply the solutions as per vendor instructions to all affected devices within expected timeframe of 48 hours (refer Patch Management):