Broadcom Releases Security Updates for VMware ESXi, vCenter Server, and Cloud Foundation Vulnerabilities
Broadcom has released an advisory addressing three security vulnerabilities in VMware ESXi, VMware vCenter Server, and VMware Cloud Foundation. VMware ESXi serves as an enterprise-grade hypervisor, VMware vCenter Server acts as a centralized manager for virtual machines, and VMware Cloud Foundation is a platform designed for provisioning cloud environments.
- CVE-2024-37085 – VMware ESXi contains an authentication bypass vulnerability, which an attacker with sufficient Active Directory (AD) permissions could exploit to gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group (‘ESXi Admins’ by default) after it was deleted from AD.
- CVE-2024-37086 – VMware ESXi contains an out-of-bounds read vulnerability, which an attacker with local administrative privileges on a virtual machine with an existing snapshot may trigger an out-of-bounds read leading to a denial-of-service condition of the host.
- CVE-2024-37087 – The vCenter Server contains a denial-of-service vulnerability. A malicious actor with network access to vCenter Server may create a denial-of-service condition.
Further details at – https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505

I am one of the editors here at www.systemtek.co.uk I am a UK based technology professional, with an interest in computer security and telecoms.