КућаСајбер БалканVMware HCX Platform at Risk of SQL Injection Attacks

VMware HCX Platform at Risk of SQL Injection Attacks

Објављено на

spot_img

VMware has recently issued an advisory (VMSA-2024-0021) concerning a critical vulnerability found within its HCX platform. The vulnerability, identified as CVE-2024-38814, is an authenticated SQL injection flaw that poses a significant security risk. With a CVSSv3 base score of 8.8, this issue has been classified as having an “Important” severity level.

This vulnerability allows malicious authenticated users with non-administrator privileges to execute unauthorized remote code on the HCX manager by submitting specially crafted SQL queries. Such actions could lead to severe security breaches and compromise the integrity of systems utilizing the VMware HCX platform.

According to a report by Broadcom, multiple versions of VMware HCX are affected by this vulnerability, specifically versions 4.10.x, 4.9.x, and 4.8.x. To address this critical issue, VMware has promptly released patches to mitigate the risks associated with CVE-2024-38814. Users are strongly advised to apply the updates provided in the “Fixed Version” column of the response matrix below:

– VMware HCX 4.10.x: Fixed Version – 4.10.1
– VMware HCX 4.9.x: Fixed Version – 4.9.2
– VMware HCX 4.8.x: Fixed Version – 4.8.3

It is crucial for users to update their systems immediately as there are no workarounds or additional documentation available for this vulnerability. Failure to patch systems promptly could leave them vulnerable to exploitation by threat actors.

VMware has acknowledged the efforts of Sina Kheirkhah (@SinSinology) of the Summoning Team (@SummoningTeam) who, in collaboration with Trend Micro Zero Day Initiative (ZDI), responsibly reported this vulnerability. This partnership emphasizes the importance of coordinated vulnerability disclosure in upholding cybersecurity standards.

For organizations utilizing VMware HCX, it is imperative to prioritize updating systems to the fixed versions mentioned above to minimize the potential risks of exploitation. Regularly reviewing security advisories and ensuring software is up-to-date are essential practices to defend against vulnerabilities like CVE-2024-38814.

Users seeking more information can refer to VMware’s official advisory page for additional details and stay informed about any future updates or related security notices from VMware. This incident serves as a stark reminder of the ever-evolving threat landscape and the critical need for robust cybersecurity measures, especially in virtualized environments like VMware HCX.

In conclusion, addressing and mitigating vulnerabilities promptly is crucial in safeguarding sensitive systems and data from malicious actors. Stay vigilant, stay informed, and prioritize cybersecurity in all sectors to maintain a secure and resilient digital environment.

Извор линк

Најновији чланци

Amazon assists in apprehending Anonymous Sudan cyber criminals

In a groundbreaking development within the tech industry, the U.S. Department of Justice (DOJ)...

Westmoreland County, Pennsylvania Recovers Eight Hundred Thousand Dollars from Cyber Scam

The Municipal Authority of Westmoreland County has successfully recovered over $826,000 that was stolen...

Cicada3301 Ransomware Aims at Vital Industries in US and UK

A new ransomware group known as Cicada3301 has been making waves since its emergence...

Hong Kong Crime Ring Deceives Victims to the Tune of $46M

The recent arrest of 27 individuals in Hong Kong has shed light on the...

Више овако

Amazon assists in apprehending Anonymous Sudan cyber criminals

In a groundbreaking development within the tech industry, the U.S. Department of Justice (DOJ)...

Westmoreland County, Pennsylvania Recovers Eight Hundred Thousand Dollars from Cyber Scam

The Municipal Authority of Westmoreland County has successfully recovered over $826,000 that was stolen...

Cicada3301 Ransomware Aims at Vital Industries in US and UK

A new ransomware group known as Cicada3301 has been making waves since its emergence...
sr_RSSerbian