CVE-2024-38813
Oct. 2, 2024, 1:59 p.m.
Tags
CVSS Score
Products Impacted
Vendor | Product | Versions |
---|---|---|
vmware |
|
|
Description
The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.
Weaknesses
CWE-250
Execution with Unnecessary Privileges
The product performs an operation at a privilege level that is higher than the minimum level required, which creates new weaknesses or amplifies the consequences of other weaknesses.
CWE ID: 250CWE-273
Improper Check for Dropped Privileges
The product attempts to drop privileges but does not check or incorrectly checks to see if the drop succeeded.
CWE ID: 273Date
Published: Sept. 17, 2024, 6:15 p.m.
Last Modified: Oct. 2, 2024, 1:59 p.m.
Status : Analyzed
CVE has been recently published to the CVE List and has been received by the NVD.
More infoSource
security@vmware.com
CPEs
Type | Vendor | Product | Version | Update | Edition | Language | Software Edition | Target Software | Target Hardware | Other Information |
---|---|---|---|---|---|---|---|---|---|---|
a | vmware | vcenter_server | 7.0 | - | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update1 | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update1a | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update1c | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update1d | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update2 | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update2a | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update2b | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update2c | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update2d | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3 | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3a | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3c | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3d | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3e | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3f | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3g | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3h | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3i | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3j | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3k | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3l | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3m | / | / | / | / | / | / |
a | vmware | vcenter_server | 7.0 | update3n | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | - | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update1 | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update1a | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update1b | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update1c | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update1d | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update1e | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update2 | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update2a | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update2b | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update2c | / | / | / | / | / | / |
a | vmware | vcenter_server | 8.0 | update2d | / | / | / | / | / | / |
CVSS Data
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
Scope
UNCHANGED
Confidentiality Impact
HIGH
Integrity Impact
HIGH
Availability Impact
HIGH
Base Score
Exploitability Score
Impact Score
Base Severity
CRITICALCVSS Vector String
The CVSS vector string provides an in-depth view of the vulnerability metrics.
View Vector StringCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H