Outage in Pulsant

Critical Vulnerability Affecting VMware vCenter Server and VMware Cloud Foundation

Minor
November 19, 2024 - Started about 1 month ago
Official incident page

Need to monitor Pulsant outages?
Stay on top of outages with IsDown. Monitor the official status pages of all your vendors, SaaS, and tools, including Pulsant, and never miss an outage again.
Start Free Trial

Outage Details

Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild. Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812): Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813): Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue. Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968
Components affected
Pulsant Threat Intelligence Alert
Latest Updates ( sorted recent to last )
IDENTIFIED about 1 month ago - at 11/19/2024 10:06AM

Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.

Impacted Products:
VMware vCenter Server (versions 7.0, 8.0)
VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x)
Vulnerability Details:
Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):

Severity: Critical (CVSSv3 9.8)
Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server.
Resolution: Immediate application of the latest patches from the "Response Documentation" is essential.
Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):

Severity: Important (CVSSv3 7.5)
Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server.
Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.

Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968

Start monitoring all your vendors in just 5 minutes

With IsDown, you can monitor all your critical services' official status pages from one centralized dashboard and receive instant alerts the moment an outage is detected. Say goodbye to constantly checking multiple sites for updates and stay ahead of outages with IsDown.

Start free trial

No credit card required · Cancel anytime · 3278 services available

Integrations with Slack Microsoft Teams Google Chat Datadog PagerDuty Zapier Discord Webhook

Setup in 5 minutes or less

How much time you'll save your team, by having the outages information close to them?

14-day free trial · No credit card required · Cancel anytime