More

    VMware Raises Alarm Over High-Risk Vulnerability Impacting vCenter Server Product

    VMware, a cloud computing leader, recently alerted users about vulnerabilities in its server management product, notably the VMware vCenter Server. This product acts as the control hub for customers’ vSphere environments.

    Details of the Concern
    The company’s advisory and FAQ document highlight concerns about CVE-2023-34048. This critical vulnerability has earned a severity score of 9.8 out of 10 on the CVSS rating system.

    Discovery and Impact
    Grigory Dorodnov from Trend Micro Zero Day Initiative found the bug. It lets hackers breach vulnerable servers. The vulnerability’s impact is massive since many organizations use vCenter Server to oversee multiple VMware instances. A successful exploit grants full environment access and allows remote code execution, leading to further risks.

    VMware’s Response
    VMware has rolled out a patch for vCenter Server versions 6.7U3, 6.5U3, and VCF 3.x, even including some unsupported older versions.

    Expert Opinions
    John Gallagher, Viakoo Labs’ Vice President, stresses the importance of addressing this vulnerability swiftly. However, he mentions that the patching process might be time-consuming, leaving a vulnerability window. Irfan Asrar, the Director of Threat Research at Qualys, echoes this sentiment. He points out the extensive enterprise customer base of the affected products and urges organizations to prioritize this issue, especially considering the current geopolitical climate.

    Previous Attacks and Implications
    Ransomware gangs have previously targeted VMWare vCenter servers. Some groups exploited vulnerabilities like Log4Shell. This track record underlines the urgency of resolving these vulnerabilities.

    Conclusion
    Organizations using VMware vCenter Server face a significant risk. Immediate action can help prevent potential exploitation.

    Latest articles

    Related articles