CVE-2024-38812.md
 1  #### 19-09-2024
 2  
 3  **1. Description:**
 4  
 5  - **Brief Summary:** A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. 
 6  - **Technical Details:**  The vulnerability is due to a lack of validation of the calculated response header size used in subtraction. A remote, unauthenticated attacker could exploit this vulnerability by sending a crafted [[DCERPC]] packet to the target server.
 7  - **Severity Score:**
 8      - **CVSS v3.1 Base Score:** 10
 9      - **CVSS v3.1 Vector:**  CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H 
10  - **Affected Software/Versions:** 
11  	- vCenter Server 7.0, 8.0
12  	- VMware Cloud Foundation 4.x, 5.x
13  
14  **2. Related Information:**
15  
16  - **CWE:** [CWE-787](http://cwe.mitre.org/data/definitions/787.html)
17  
18  **3. Vulnerability Analysis:**
19  
20  - **Impact:** 
21  	- Remote Code Execution(RCE)
22  - **Remediation:** Install patch
23  
24  **4. References:**
25  
26  - **Official CVE Entry:** [Yes](https://cve.mitre.org/cgi-bin/cvename.cgi?name=2024-38812)
27  - **Vendor Advisory:** 
28  	- [Nordic Defender](https://nordicdefender.com/blog/critical-rce-vcenter-vulnerabilities-patches-for-cve-2024-38812)
29  - **Other Relevant Resources:** 
30  - **POC**:
31  
32  **5. Notes (Optional):**
33  
34  - **Additional Information:** 
35  - **Timeline:**