VMware has recently addressed two vulnerabilities in its vCenter Server software  . These vulnerabilities pose significant risks and require immediate attention.
The first vulnerability, known as CVE-2023-34048   , is a critical flaw in the DCE/RPC protocol implementation. It allows an attacker with network access to execute remote code , making it a serious threat. Grigory Dorodnov of Trend Micro Zero Day Initiative discovered and reported this vulnerability. Its severity is evident from its CVSS v3 score of 9.8. To address this issue, VMware has released patches for multiple versions of vCenter Server  , including 6.7U3, 6.5U3 , and 8.0U1  . Users are strongly advised to update their systems promptly. Furthermore, asynchronous patches are available for VCF 5x and 4x deployments .
The second vulnerability, not mentioned in the reference text, is a moderate-severity information disclosure flaw . It allows unauthorized access to data for non-administrative users . Although not directly related to the main focus of the information, it is worth noting for a comprehensive understanding of the situation.
These vulnerabilities highlight the importance of promptly applying patches and updates to ensure the security of VMware vCenter Server. Failure to do so may result in unauthorized access, data breaches, and potential remote code execution     . Users must take immediate action to mitigate these risks and protect their systems. Additionally, this serves as a reminder of the ongoing need for vigilance and proactive measures to safeguard against emerging threats in the future.