9.8 CVE-2024-38813
Privilege Escalation RCE Injection SQL
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
https://nvd.nist.gov/vuln/detail/CVE-2024-38813
Categories
CWE-273 : Improper Check for Dropped Privileges
If the drop fails, the product will continue to run with the raised privileges, which might provide additional access to unprivileged users.
CWE-250 : Execution with Unnecessary Privileges
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses. This weakness can be detected using tools and techniques that require manual (human) analysis, such as penetration testing, threat modeling, and interactive tools that allow the tester to record and modify an active session. Run your code using the lowest privileges that are required to accomplish the necessary tasks [REF-76]. If possible, create isolated accounts with limited privileges that are only used for a single task. That way, a successful attack will not immediately give the attacker access to the rest of the software or its environment. For example, database applications rarely need to run as the database administrator, especially in day-to-day operations. Identify the functionality that requires additional privileges, such as access to privileged operating system resources. Wrap and centralize this functionality if possible, and isolate the privileged code as much as possible from other code [REF-76]. Raise privileges as late as possible, and drop them as soon as possible to avoid CWE-271. Avoid weaknesses such as CWE-288 and CWE-420 by protecting all possible communication channels that could interact with the privileged code, such as a secondary socket that is only intended to be accessed by administrators. Identify the functionality that requires additional privileges, such as access to privileged operating system resources. Wrap and centralize this functionality if possible, and isolate the privileged code as much as possible from other code [REF-76]. Raise privileges as late as possible, and drop them as soon as possible to avoid CWE-271. Avoid weaknesses such as CWE-288 and CWE-420 by protecting all possible communication channels that could interact with the privileged code, such as a secondary socket that is only intended to be accessed by administrators. Perform extensive input validation for any privileged code that must be exposed to the user and reject anything that does not fit your strict requirements. When dropping privileges, ensure that they have been dropped successfully to avoid CWE-273. As protection mechanisms in the environment get stronger, privilege-dropping calls may fail even if it seems like they would always succeed. If circumstances force you to run with extra privileges, then determine the minimum access level necessary. First identify the different permissions that the software and its users will need to perform their actions, such as file read and write permissions, network socket permissions, and so forth. Then explicitly allow those actions while denying all else [REF-76]. Perform extensive input validation and canonicalization to minimize the chances of introducing a separate vulnerability. This mitigation is much more prone to error than dropping the privileges in the first place. Ensure that the software runs properly under the United States Government Configuration Baseline (USGCB) [REF-199] or an equivalent hardening configuration guide, which many organizations use to limit the attack surface and potential risk of deployed software. FTP client program on a certain OS runs with setuid privileges and has a buffer overflow. Most clients do not need extra privileges, so an overflow is not a vulnerability for those clients. Program runs with privileges and calls another program with the same privileges, which allows read of arbitrary files. OS incorrectly installs a program with setuid privileges, allowing users to gain privileges. Composite: application running with high privileges (CWE-250) allows user to specify a restricted file to process, which generates a parsing error that leaks the contents of the file (CWE-209). Program does not drop privileges before calling another program, allowing code execution. setuid root program allows creation of arbitrary files through command line argument. Installation script installs some programs as setuid when they shouldn't be. mail program runs as root but does not drop its privileges before attempting to access a file. Attacker can use a symlink from their home directory to a directory only readable by root, then determine whether the file exists based on the response. Product launches Help functionality while running with raised privileges, allowing command execution using Windows message to access "open file" dialog.
References
security@vmware.com
CPE
cpe | start | end |
---|---|---|
Configuration 1 | ||
cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:* | ||
Configuration 2 | ||
cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update1e:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:* | ||
cpe:2.3:a:vmware:vcenter_server:8.0:update2d:*:*:*:*:*:* |
REMEDIATION
EXPLOITS
Exploit-db.com
id | description | date | |
---|---|---|---|
No known exploits |
POC Github
Url |
---|
No known exploits |
Other Nist (github, ...)
Url |
---|
No known exploits |
CAPEC
Common Attack Pattern Enumerations and Classifications
id | description | severity |
---|---|---|
104 | Cross Zone Scripting |
High |
470 | Expanding Control over the Operating System from the Database |
Very High |
69 | Target Programs with Elevated Privileges |
Very High |
Cybersecurity needs ?
Strengthen software security from the outset with our DevSecOps expertise
Integrate security right from the start of the software development cycle for more robust applications and greater customer confidence.
Our team of DevSecOps experts can help you secure your APIs, data pipelines, CI/CD chains, Docker containers and Kubernetes deployments.