Initiatives for
As the national authority for Cybersecurity the CCB has developed several initiatives for specific publics which are presented here.
Reference:
Advisory #2024-91
Version:
1.0
Affected software:
VMware vCenter
Type:
Remote Code Execution (RCE), Privilege Escalation
CVE/CVSS:
Multiple heap-overflow vulnerabilities in VMware vCenter Server were found. A malicious actor with network access may trigger these vulnerabilities by sending a specially crafted network packet potentially leading to remote code execution.
A privilege escalation vulnerability in vCenter Server was found. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on a vCenter Server Appliance.
The Centre for Cybersecurity Belgium (CCB) recommends system administrators patch vulnerable systems as soon as possible and to follow the additional measures as recommended by the vendor. Analyse system and network logs for any suspicious activity. This report has instructions to help your organisation.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
Multiple heap-overflow and privilege escalation vulnerabilities in vCenter Server were found:
Patched versions are available on the website of the vendor: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
The latest version of the involved product can be found on their website: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453.
Monitor/Detect
The CCB recommends organisations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.