⚠ Actively exploited
Added to CISA KEV on 2024-11-20. Federal agencies required to patch by 2024-12-11. Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable..

CVE-2024-38813

CWE-250CWE-2736 documents6 sources
Severity
9.8CRITICAL
EPSS
29.5%
top 3.39%
CISA KEV
KEV
Added 2024-11-20
Due 2024-12-11
Exploit
Exploited in wild
Active exploitation observed
Timeline
PublishedSep 17
KEV addedNov 20
KEV dueDec 11
CISA Required Action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.

CVSS vector

CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 1.6 | Impact: 5.9

Affected Packages4 packages

CVEListV5vmware_vcenter_server8.08.0 U3b+1
NVDvmware/vcenter_server7.0, 8.0+1
NVDvmware/cloud_foundation4.05.2
CVEListV5vmware_cloud_foundation4.x, 5.x+1

🔴Vulnerability Details

3
CVEList
Privilege escalation vulnerability2024-09-17
GHSA
GHSA-66vj-hxh5-x3jh: The vCenter Server contains a privilege escalation vulnerability2024-09-17
VulnCheck
VMware vCenter Server Privilege Escalation Vulnerability2024

📋Vendor Advisories

1
CISA
VMware vCenter Server Privilege Escalation Vulnerability2024-11-20

🕵️Threat Intelligence

1
Bleepingcomputer
Critical RCE bug in VMware vCenter Server now exploited in attacks2024-11-18