CVE-2024-38812.md
1 #### 19-09-2024 2 3 **1. Description:** 4 5 - **Brief Summary:** A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. 6 - **Technical Details:** The vulnerability is due to a lack of validation of the calculated response header size used in subtraction. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted [[DCERPC]] packet to the target server. 7 - **Severity Score:** 8 - **CVSS v3.1 Base Score:** 10 9 - **CVSS v3.1 Vector:** CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 10 - **Affected Software/Versions:** 11 - vCenter Server 7.0, 8.0 12 - VMware Cloud Foundation 4.x, 5.x 13 14 **2. Related Information:** 15 16 - **CWE:** [CWE-787](http://cwe.mitre.org/data/definitions/787.html) 17 18 **3. Vulnerability Analysis:** 19 20 - **Impact:** 21 - Remote Code Execution(RCE) 22 - **Remediation:** Install patch 23 24 **4. References:** 25 26 - **Official CVE Entry:** [Yes](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38812) 27 - **Vendor Advisory:** 28 - [Nordic Defender](https://nordicdefender.com/blog/critical-rce-vcenter-vulnerabilities-patches-for-cve-2024-38812) 29 - **Other Relevant Resources:** 30 - **POC**: 31 32 **5. Notes (Optional):** 33 34 - **Additional Information:** 35 - **Timeline:**