Multiple vulnerabilities in VMware NSX



Published: 2024-10-16
Risk Medium
Patch available YES
Number of vulnerabilities 3
CVE-ID CVE-2024-38817
CVE-2024-38818
CVE-2024-38815
CWE-ID CWE-78
CWE-269
CWE-451
Exploitation vector Network
Public exploit N/A
Vulnerable software
Subscribe
NSX-T
Server applications / Virtualization software

Vendor VMware, Inc

Security Bulletin

This security bulletin contains information about 3 vulnerabilities.

1) OS Command Injection

EUVDB-ID: #VU98754

Risk: Low

CVSSv3.1: 5.8 [CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38817

CWE-ID: CWE-78 - Improper Neutralization of Special Elements used in an OS Command ('OS Command Injection')

Exploit availability: No

Description

The vulnerability allows a local user to escalate privileges on the system.

The vulnerability exists due to improper input validation. A local privileged user can pass specially crafted data to the application and execute arbitrary OS commands on the target system.


Mitigation

Install updates from vendor's website.

Vulnerable software versions

NSX-T: 3.0.0 - 4.2.0.2

CPE2.3 External links

http://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25047


Q & A

Can this vulnerability be exploited remotely?

No. This vulnerability can be exploited locally. The attacker should have authentication credentials and successfully authenticate on the system.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

2) Improper privilege management

EUVDB-ID: #VU98755

Risk: Medium

CVSSv3.1: 6.2 [CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:L/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38818

CWE-ID: CWE-269 - Improper Privilege Management

Exploit availability: No

Description

The vulnerability allows a remote user to escalate privileges on the system.

The vulnerability exists due to improper privilege management. A remote user can obtain permissions from a separate group role than previously assigned.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NSX-T: 4.0.0.1 - 4.2.0.2

CPE2.3 External links

http://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25047


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote authenticated user via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.

3) Spoofing attack

EUVDB-ID: #VU98756

Risk: Low

CVSSv3.1: 3.8 [CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:L/A:N/E:U/RL:O/RC:C]

CVE-ID: CVE-2024-38815

CWE-ID: CWE-451 - User Interface (UI) Misrepresentation of Critical Information (Clickjacking, spoofing)

Exploit availability: No

Description

The vulnerability allows a remote attacker to perform spoofing attack.

The vulnerability exists due to incorrect processing of user-supplied data. A remote attacker can trick the victim into clicking on a specially crafted URL and spoof the page content.

Mitigation

Install updates from vendor's website.

Vulnerable software versions

NSX-T: 4.0.0.1 - 4.2.0.2

CPE2.3 External links

http://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25047


Q & A

Can this vulnerability be exploited remotely?

Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.

Is there known malware, which exploits this vulnerability?

No. We are not aware of malware exploiting this vulnerability.



###SIDEBAR###