Hello,
In case anyone missed the news of the day:
CVE-2023-34048, updates are available. Don’t wait too long if you’re exposed. I didn’t find a public POC yet, i think it won’t be long now.
Hello,
In case anyone missed the news of the day:
CVE-2023-34048, updates are available. Don’t wait too long if you’re exposed. I didn’t find a public POC yet, i think it won’t be long now.
Saw this in the Security emails that I get for VMware but good to inform the community. Thanks for sharing.
Got the email from VMware this AM. Most of us don’t allow public IP’s to hit our vCenter’s hopefully 🙂, but I’ll be doing the update when I can.
Firewalls just get in the way. If you put your vCenter and your hosts on a public IP, you’ll be able to access them anywhere!
Firewalls just get in the way. If you put your vCenter and your hosts on a public IP, you’ll be able to access them anywhere!
Better yet, forward 3399 to your home PC and enable RDP while you are away. It’s a great way for “Remote access” and cheaper than a VPN. Put that cost savings for a .com domain name to simplify needing an IP address even.
*disclaimer* If you don’t sense the sarcasm, please do not do this.
Yes, thank you for the sharing on this high scoring vulnerabilities.
The update must be done via the manual mount of the ISO not the VAMI.
Hello,
In case anyone missed the news of the day:
CVE-2023-34048, updates are available. Don’t wait too long if you’re exposed. I didn’t find a public POC yet, i think it won’t be long now.
Yes, VMware claims they have not found any evidence of the CVE-2023-34048 being exploited.
Enter your E-mail address. We'll send you an e-mail with instructions to reset your password.