Initiatives pour
En tant qu'autorité nationale en matière de cybersécurité, le CCB a développé plusieurs initiatives destinées à des publics spécifiques, qui sont présentées ici.
Reference:
Advisory #2024-244
Version:
1.0
Affected software:
VMware HCX prior to 4.10.1, 4.9.2, and 4.8.3
Type:
Authenticated SQL injection
CVE/CVSS:
CVE-2024-38814: CVSS 8.8 (CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform remote code execution on the HCX manager. This could highly impact confidentiality, integrity, and availability.
CVE-2024-38814 is a high security issue (CVSS 8.8 according to CNA) which allows a malicious authenticated user with non-administrator privileges to enter specially crafted SQL queries and perform remote code execution on the HCX manager.
Patch
The Centre for Cybersecurity Belgium strongly recommends installing updates for vulnerable devices with the highest priority, after thorough testing.
Monitor/Detect
The CCB recommends organizations upscale monitoring and detection capabilities to identify any related suspicious activity, ensuring a swift response in case of an intrusion.
In case of an intrusion, you can report an incident via: https://ccb.belgium.be/cert/report-incident
While patching appliances or software to the newest version may provide safety from future exploitation, it does not remediate historic compromise.