VMware issues patches for critical sandbox-escape vulnerabilities

VMware issues patches for critical sandbox-escape vulnerabilities

Getty Images VMware is urging customers to patch critical vulnerabilities that make it possible for hackers to break out of sandbox and hypervisor protections in all versions, including out-of-support ones, of VMware ESXi, Workstation, Fusion, and Cloud Foundation products. A constellation of four vulnerabilities—two carrying severity ratings of 9.3 out of a possible 10—are serious … Read more

Critical VMware vulnerabilities addressed

Critical VMware vulnerabilities addressed

Updates have been issued by VMware to resolve critical security vulnerabilities impacting its ESXi, Cloud Foundation, Fusion, and Workstation offerings, according to Security Affairs. Most severe of the addressed flaws were a pair of use-after-free issues in the XHCI USB and UHCI USB controllers, tracked as CVE-2024-22252 and CVE-2024-22253, respectively, said VMware in its advisory. Both vulnerabilities could … Read more

Alert: PoC Exploits Released for Citrix and VMware Vulnerabilities

Alert: PoC Exploits Released for Citrix and VMware Vulnerabilities

Oct 25, 2023NewsroomExploit / Vulnerability Virtualization services provider VMware has alerted customers to the existence of a proof-of-concept (PoC) exploit for a recently patched security flaw in Aria Operations for Logs. Tracked as CVE-2023-34051 (CVSS score: 8.1), the high-severity vulnerability relates to a case of authentication bypass that could lead to remote code execution. “An … Read more

TCP/IP Security: Protecting Your Network from Vulnerabilities.

TCP/IP Security: Protecting Your Network from Vulnerabilities In today’s digital age, every organization needs a secure networking system to keep their sensitive information safe. The Transmission Control Protocol/Internet Protocol (TCP/IP) is the backbone of the internet and is widely used for data transmission between computers. However, being online puts your network at risk of vulnerability … Read more

Securing Your Virtual Machines: Understanding Common Vulnerabilities

Virtualization technology has revolutionized the IT industry and transformed the way we use Computing resources. Virtual machines (VMs) have emerged as the building blocks of IT infrastructure in modern organizations. They are used to run multiple instances of an operating system, applications, and workloads on a single physical server, making server consolidation, resource optimization, and … Read more

Defending against virtual machine vulnerabilities: Strategies for safeguarding your data

With the numerous benefits virtual machines (VMs) provide, they have grown to become the backbone of many organisations’ IT infrastructure. In simple terms, VMs are software emulations of a physical computer enabling multiple operating systems (OSs) to operate on a single physical server. However, as advantageous as VMs are, they are not impervious to threats, … Read more