VMware has released software updates to address several memory corruption vulnerabilities discovered in vCenter Server. These vulnerabilities, if left unaddressed, could potentially lead to remote code execution. Below are the key vulnerabilities patched by VMware.
-
Patched Vulnerabilities: VMware has addressed a total of five security defects in vCenter Server related to the DCERPC protocol. Among these vulnerabilities, four are classified as 'important' with a CVSS score of 8.1. Notably, two of these issues (CVE-2023-20892 and CVE-2023-20893) involve heap buffer overflow and use-after-free flaws, respectively, which could allow malicious actors to execute arbitrary code on the underlying operating system hosting vCenter Server.
-
Out-of-Bounds Write and Authentication Bypass: Another patched vulnerability, CVE-2023-20894, is an out-of-bounds write bug that can be triggered through specially crafted packets, potentially causing memory corruption. The fourth vulnerability, CVE-2023-20895, is a memory corruption flaw that allows for network-based exploitation to bypass authentication.
-
Denial-of-Service (DoS) Vulnerability: In addition to the code execution vulnerabilities, VMware's updates also address an important-severity out-of-bounds read vulnerability. Exploiting this flaw remotely could lead to a DoS condition on services such as vmcad, vmdird, and vmafdd.
Update Recommendations
VMware urges all customers to update their affected products to the patched versions. It is important to note that there are no workarounds available for these vulnerabilities at the moment. While VMware is not currently aware of any instances of these flaws being exploited in the wild, it is crucial for users to promptly update their vCenter Server deployments to the patched versions to proactively mitigate any potential risks.
By promptly applying these patches, customers can mitigate the risks associated with remote code execution and potential memory corruption. Organisations using vCenter Server should prioritise the installation of the patched versions to maintain a secure and resilient virtual infrastructure environment.
Back to Top