<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic New patch for VMWare vCenter that removes remote code execution in Threats</title>
    <link>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/73924#M1377</link>
    <description>&lt;P&gt;A new patch has been released for vCenter which removes an exploit rating 9.8 on CVSS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2024/09/patch-issued-for-critical-vmware.html" target="_blank"&gt;https://thehackernews.com/2024/09/patch-issued-for-critical-vmware.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
    <pubDate>Wed, 18 Sep 2024 09:13:17 GMT</pubDate>
    <dc:creator>funkychicken</dc:creator>
    <dc:date>2024-09-18T09:13:17Z</dc:date>
    <item>
      <title>New patch for VMWare vCenter that removes remote code execution</title>
      <link>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/73924#M1377</link>
      <description>&lt;P&gt;A new patch has been released for vCenter which removes an exploit rating 9.8 on CVSS&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://thehackernews.com/2024/09/patch-issued-for-critical-vmware.html" target="_blank"&gt;https://thehackernews.com/2024/09/patch-issued-for-critical-vmware.html&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 18 Sep 2024 09:13:17 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/73924#M1377</guid>
      <dc:creator>funkychicken</dc:creator>
      <dc:date>2024-09-18T09:13:17Z</dc:date>
    </item>
    <item>
      <title>Re: New patch for VMWare vCenter that removes remote code execution</title>
      <link>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/74362#M1379</link>
      <description>&lt;P&gt;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/190759473"&gt;@funkychicken&lt;/a&gt;I think a lot of organisations will be moving away from VMWare as the costs associated with purchasing and supporting have gone up astronomically.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Regards&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Caute_Cautim&lt;/P&gt;</description>
      <pubDate>Sat, 05 Oct 2024 04:27:14 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/74362#M1379</guid>
      <dc:creator>Caute_cautim</dc:creator>
      <dc:date>2024-10-05T04:27:14Z</dc:date>
    </item>
    <item>
      <title>Re: New patch for VMWare vCenter that removes remote code execution</title>
      <link>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/74364#M1380</link>
      <description>&lt;P&gt;Yes I agree. I migrated one company from VMWare to Hyper-V and Nuntanix has been playing a big part in the hypervisor market too. I think the costs for VMWare are astronomical, and all of the "nice to have's" don't make it a worthwhile choice.&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 05 Oct 2024 07:05:51 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/74364#M1380</guid>
      <dc:creator>funkychicken</dc:creator>
      <dc:date>2024-10-05T07:05:51Z</dc:date>
    </item>
    <item>
      <title>Re: New patch for VMWare vCenter that removes remote code execution</title>
      <link>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/75298#M1425</link>
      <description>&lt;P&gt;VMware has released a critical security patch for vCenter Server addressing a remote code execution (RCE) vulnerability that could allow unauthorized attackers to execute arbitrary code on affected systems. The vulnerability, identified as CVE-[Insert CVE ID], stems from improper input validation in specific vCenter components. Administrators are strongly urged to update their systems to the latest version immediately to mitigate potential exploitation risks. VMware also recommends reviewing &lt;SPAN&gt;&lt;A href="https://leatheryork.co.uk/product-category/apparel-accessories/clothing/outerwear/coats-jackets/" target="_blank" rel="noopener"&gt;Exclusive Men's Coats&lt;/A&gt;&amp;nbsp;&lt;/SPAN&gt;network configurations to limit vCenter's exposure and ensure robust security practices. Detailed patch instructions and release notes are available on VMware's official site.&lt;/P&gt;</description>
      <pubDate>Mon, 25 Nov 2024 04:56:46 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/New-patch-for-VMWare-vCenter-that-removes-remote-code-execution/m-p/75298#M1425</guid>
      <dc:creator>chunkypigs72</dc:creator>
      <dc:date>2024-11-25T04:56:46Z</dc:date>
    </item>
  </channel>
</rss>

