First published: Wed Oct 25 2023(Updated: )
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware vCenter Server | >=4.0<=5.5 | |
VMware vCenter Server | =7.0 | |
VMware vCenter Server | =7.0-a | |
VMware vCenter Server | =7.0-b | |
VMware vCenter Server | =7.0-c | |
VMware vCenter Server | =7.0-d | |
VMware vCenter Server | =7.0-update1 | |
VMware vCenter Server | =7.0-update1a | |
VMware vCenter Server | =7.0-update1c | |
VMware vCenter Server | =7.0-update1d | |
VMware vCenter Server | =7.0-update2 | |
VMware vCenter Server | =7.0-update2a | |
VMware vCenter Server | =7.0-update2b | |
VMware vCenter Server | =7.0-update2c | |
VMware vCenter Server | =7.0-update2d | |
VMware vCenter Server | =7.0-update3 | |
VMware vCenter Server | =7.0-update3a | |
VMware vCenter Server | =7.0-update3c | |
VMware vCenter Server | =7.0-update3d | |
VMware vCenter Server | =7.0-update3e | |
VMware vCenter Server | =7.0-update3f | |
VMware vCenter Server | =7.0-update3g | |
VMware vCenter Server | =7.0-update3h | |
VMware vCenter Server | =7.0-update3i | |
VMware vCenter Server | =7.0-update3j | |
VMware vCenter Server | =7.0-update3k | |
VMware vCenter Server | =7.0-update3l | |
VMware vCenter Server | =7.0-update3m | |
VMware vCenter Server | =7.0-update3n | |
VMware vCenter Server | =8.0 | |
VMware vCenter Server | =8.0-a | |
VMware vCenter Server | =8.0-b | |
VMware vCenter Server | =8.0-c | |
VMware vCenter Server | =8.0-update1 | |
VMware vCenter Server | =8.0-update1a | |
VMware vCenter Server | =8.0-update1b | |
VMware vCenter Server | =8.0-update1c | |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2023-34048 is a vulnerability in vCenter Server that allows a malicious actor to trigger an out-of-bounds write potentially leading to remote code execution.
CVE-2023-34048 has a severity rating of 9.8, which means it is considered critical.
CVE-2023-34048 affects vCenter Server by exploiting an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.
CVE-2023-34048 affects VMware vCenter Server versions 4.0 to 5.5, and versions 7.0 to 8.0.
To fix CVE-2023-34048, it is recommended to apply the necessary updates or patches provided by VMware. Please refer to the official VMware security advisory for specific instructions.