itopia Status
Real-time updates of itopia issues and outages
itopia status is Operational
Active Incidents
No active incidents
Recently Resolved Incidents
No recent incidents
itopia Outage Survival Guide
itopia Components
itopia Main Portal
itopia RDP Download Portal
itopia Help Center Portal
itopia Main Features
Signup
Billing
Discovery
Provision
Snapshots
Insights
Server Uptime
itopia Integrations
Core
Slack
Zendesk
ConnectWise
itopia Notifications
CAS Email Notifications
Incidents Email Notifications
Incidents SMS Notifications
itopia Google
Identity & Access Management
Google Cloud Networking
Google Stackdriver
Google App Engine
Google BigQuery
Google Cloud Datastore
Google Cloud Storage
Security
Cloud Key Management Service
Google Cloud DNS
itopia Google Compute Engine
us-east4
us-central1
us-west2
us-west1
us-east4
us-east1
europe-west1
europe-north1
europe-north1
europe-west3
europe-west2
europe-west4
australia-southeast1
asia-east1
asia-northeast1
itopia Support
Web Messenger
Mobile Messenger
Ticketing System
itopia Alternatives
Ivanti Cloud App Sanity
Ivanti Cloud AppConnect Wrapping Portal
Pulsant Service Threat Intelligence Alert
Pulsant Cyber Security are aware of Critical Vulnerabilities impacting VMware vCenter Server and VMware Cloud Foundation. These include a heap-overflow vulnerability (CVE-2024-38812) with a CVSSv3 score of 9.8, and a privilege escalation vulnerability (CVE-2024-38813) with a CVSSv3 score of 7.5. Exploitation of these vulnerabilities has been observed in the wild.
Impacted Products: VMware vCenter Server (versions 7.0, 8.0) VMware Cloud Foundation (versions 4.x, 5.x, 5.1.x) Vulnerability Details: Heap-overflow vulnerability in vCenter Server (CVE-2024-38812):
Severity: Critical (CVSSv3 9.8) Description: This vulnerability in the DCERPC protocol allows remote code execution when an attacker with network access sends a specially crafted packet to vCenter Server. Resolution: Immediate application of the latest patches from the "Response Documentation" is essential. Privilege escalation vulnerability in vCenter Server (CVE-2024-38813):
Severity: Important (CVSSv3 7.5) Description: This vulnerability can enable an attacker to escalate privileges to root by sending a specially crafted packet to vCenter Server. Resolution: Application of the latest patches from the "Response Documentation" is required to remediate this issue.
Response Documentation : https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24968