CVE-2024-38812

9.8 CRITICAL

📋 TL;DR

CVE-2024-38812 is a critical heap-overflow vulnerability in vCenter Server's DCERPC protocol implementation that allows remote code execution. Attackers with network access can exploit it by sending specially crafted packets. Organizations running vulnerable vCenter Server versions are affected.

💻 Affected Systems

Products:
  • VMware vCenter Server
Versions: Multiple versions up to and including 8.0 U2c
Operating Systems: Windows, Linux
Default Config Vulnerable: ⚠️ Yes
Notes: All deployments with DCERPC protocol enabled are vulnerable. vCenter Server Appliance (VCSA) and Windows versions are both affected.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full system compromise leading to complete vCenter Server takeover, lateral movement across virtual infrastructure, and data exfiltration.

🟠

Likely Case

Remote code execution with SYSTEM/root privileges, enabling attackers to deploy ransomware, create backdoors, or disrupt virtual infrastructure.

🟢

If Mitigated

Limited impact if network segmentation, strict access controls, and intrusion prevention systems block exploitation attempts.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: vCenter Server 8.0 U2d and later

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968

Restart Required: Yes

Instructions:

1. Download vCenter Server 8.0 U2d or later from VMware Customer Connect portal. 2. Backup vCenter Server configuration and data. 3. Apply the update following VMware's upgrade documentation. 4. Restart vCenter Server services.

🔧 Temporary Workarounds

Network Segmentation

all

Restrict network access to vCenter Server to only trusted management networks and required administrative systems.

Firewall Rules

all

Block DCERPC protocol (port 135) and other unnecessary ports at network perimeter and host firewalls.

# Example Linux iptables rule: iptables -A INPUT -p tcp --dport 135 -j DROP
# Example Windows PowerShell: New-NetFirewallRule -DisplayName "Block DCERPC" -Direction Inbound -Protocol TCP -LocalPort 135 -Action Block

🧯 If You Can't Patch

  • Isolate vCenter Server on dedicated management VLAN with strict access controls
  • Implement network-based intrusion prevention systems (IPS) with rules to detect and block exploitation attempts

🔍 How to Verify

Check if Vulnerable:

Check vCenter Server version via vSphere Client (Menu > Administration > System Configuration > Nodes) or SSH: cat /etc/vmware-release

Check Version:

On vCenter Server Appliance: cat /etc/vmware-release | grep -i version

Verify Fix Applied:

Confirm version is 8.0 U2d or later and check VMware Security Advisory VMSA-2024-0016 for specific build numbers

📡 Detection & Monitoring

Log Indicators:

  • Unusual DCERPC protocol activity in vCenter logs
  • Failed authentication attempts followed by successful exploitation
  • Unexpected process creation or service restarts

Network Indicators:

  • Malformed DCERPC packets to port 135/tcp
  • Unusual outbound connections from vCenter Server
  • Traffic patterns matching known exploit signatures

SIEM Query:

source="vcenter*" AND (event_type="security_alert" OR process="*exploit*" OR network_port=135)

🔗 References

📤 Share & Export