VMware Fixes vCenter Server’s Code Execution Flaw


VMware has recently announced the release of patches for a vCenter Server flaw, that could result in arbitrary code execution. The vCenter Server, a centralized management tool, is used to manage ESXi hosts, virtual machines, and other related entities.

The security flaw is identified as CVE-2022-31680 and is categorized as an unsafe deserialization vulnerability in the platform services controller (CVSS score of 7.2). (PSC). According to the company’s advisory, “A malicious actor with admin access on vCenter server may exploit this issue to execute arbitrary code on the underlying operating system that hosts the vCenter Server.”

The vulnerability, which was discovered by Marcin Noga of Cisco Talos, was fixed with the introduction of VMware vCenter Server 6.5 U3u.

Read More: VMware Patches Code Execution Vulnerability in vCenter Server

For more such updates follow us on Google News ITsecuritywire News. Please subscribe to our Newsletter for more updates.