{"id":4130,"date":"2021-05-31T09:36:22","date_gmt":"2021-05-31T07:36:22","guid":{"rendered":"https:\/\/xopero.com\/blog\/?p=4130"},"modified":"2024-05-15T12:56:02","modified_gmt":"2024-05-15T10:56:02","slug":"new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover","status":"publish","type":"post","link":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/","title":{"rendered":"New critical security bug in VMware vCenter allows a full takeover"},"content":{"rendered":"\n<p>Last week turned out to be extremely unfavorable for Apple. First, the world heard about a new 0-day vulnerability that allows attackers to secretly perform print screens. Yes, let\u2019s forget about any privacy\u2026 And then just a few days later, news about M1RACLES has come to our attention too. What is all the hype about? The bug is a result of a flaw in the M1 design. And what is even worse\u2026 That information you will find below. In this issue, we also describe a new variant of the Rowhammer attack. Half-Double &#8211; this is the name it got &#8211; allows bypassing all current defenses. However, today&#8217;s <a href=\"https:\/\/xopero.com\/blog\/en\/category\/security-center\/\" target=\"_blank\" rel=\"noreferrer noopener\">Security Center<\/a> opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\/10 CVSS!), exploiting the vulnerability is trivial. Hence the pressure from security experts and the vendor itself to urgently update vulnerable systems.<\/p>\n\n\n\n<!--more-->\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-1\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"vmware-vcenter-with-critical-9810-severity-bug-patch-asap\"><strong>VMware vCenter with critical 9.8\/10 severity bug &#8211; patch ASAP!<\/strong><\/h2>\n\n\n<p>VMware\u2019s virtualization management platform, vCenter Server, has a critical severity bug &#8211; rated as 9.8 out of 10. The company is urging customers to patch it \u201cas soon as possible\u201d. Successful exploitation would allow an attacker to execute arbitrary commands on the underlying vCenter host and take control of a company\u2019s affected system.<\/p>\n\n\n<h5 class=\"wp-block-heading\" id=\"vmware-vcenter-bug-why-such-a-high-cvss-rating\">VMware vCenter bug &#8211; why such a high CVSS rating?<\/h5>\n\n\n<p>The vulnerability tracked as CVE-2021-21985 impacts a popular vCenter Server platform used to administer VMware\u2019s market-leading vSphere and ESXi host products. Specifically impacts the Virtual SAN Health Check plugin, which is enabled by default in vCenter Server even if the plugin is not actually being used.<\/p>\n\n\n\n<p>Exploiting the vulnerability is trivial. All an attacker would need to do is be able to access the vCenter Server over port 443. So even if an organization has not exposed vCenter Server externally, attackers can still exploit this flaw once inside a network.&nbsp;<\/p>\n\n\n\n<p>Earlier last week, VMware reported another bug &#8211; CVE 2021-21986. This second bug has a medium CVSS severity rating of 6.5 and is tied to an authentication mechanism issue in vCenter Server plugins.<\/p>\n\n\n\n<p>Workarounds and updates are already available to mitigate both flaws. In addition to the patches, VMware has made some improvements to plugin authentication in the vCenter Server plugin framework.<\/p>\n\n\n\n<p>Sources <a href=\"https:\/\/threatpost.com\/vmware-ransomware-alarm-critical-bug\/166501\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">1<\/a> |&nbsp;<a href=\"https:\/\/www.securityweek.com\/vmware-urges-customers-immediately-patch-critical-vsphere-vulnerability\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">2<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-2\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"rowhammer-problem-wont-go-away-soon-new-halfdouble-variant-proofs-it\"><strong>Rowhammer problem won\u2019t go away soon &#8211; new Half-Double variant proofs it<\/strong><\/h2>\n\n\n<p>Google researchers discovered a new variant of this attack against DRAM chips, dubbed \u201cHalf-Double,\u201d that allows bypassing all current defenses.&nbsp;<\/p>\n\n\n\n<p>The new Half-Double hammering technique hinges on the weak coupling between two memory rows that are not immediately adjacent to each other but one row removed in an attempt to tamper with data stored in memory and attack a system.<\/p>\n\n\n\n<div class=\"wp-block-image\"><figure class=\"aligncenter size-large\"><a href=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2023\/10\/Rowhammer-1.jpg\"><img decoding=\"async\" width=\"728\" height=\"336\" src=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2023\/10\/Rowhammer-1.jpg\" alt=\"\" class=\"wp-image-5161\"\/><\/a><figcaption>Source: Google<\/figcaption><\/figure><\/div>\n\n\n\n<p>We have described unusual <a href=\"https:\/\/xopero.com\/blog\/en\/beware-two-new-whatsapp-bugs-expose-you-to-a-man-in-the-middle-attack\/#paragraph-3\" target=\"_blank\" rel=\"noreferrer noopener\">Rowhammer techniques<\/a> last month &#8211; Rowhammer refers to a class of DRAM vulnerabilities whereby repeated accesses to a memory row (&#8222;aggressor&#8221;) can induce an electrical disturbance big enough to flip bits stored in an adjacent row (&#8222;victim&#8221;), thereby allowing untrusted code to escape its sandbox and take over control of the system.<\/p>\n\n\n\n<p>It works because DRAM cells have been getting smaller and closer together.<\/p>\n\n\n\n<p>While DRAM manufacturers deployed countermeasures like Target Row Refresh (TRR) to thwart such attacks, the mitigations have been limited to two immediate neighbors of an aggressor row, thus excluding memory cells at a two-row distance. The imperfect protection gave an opportunity for new Rowhammer attacks such as TRRespass, SMASH, and now Half-Double.&nbsp;<\/p>\n\n\n\n<p>Google said it&#8217;s currently working with Partners to identify possible solutions for Rowhammer exploits.<\/p>\n\n\n\n<p><a href=\"https:\/\/thehackernews.com\/2021\/05\/google-researchers-discover-new-variant.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-3\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"hackers-used-macos-0days-to-bypass-privacy-features-and-take-sneaky-screenshots\">Hackers used macOS 0-days to bypass privacy features and take sneaky screenshots<\/h2>\n\n\n<p>Apple has patched a critical bug in macOS that could be exploited to take screenshots of someone\u2019s computer and capture images of their activity within applications or on video conferences without that person knowing.<\/p>\n\n\n\n<p>Researchers have discovered that the XCSSET spyware was using the vulnerability, tracked as CVE-2021-30713, to take screenshots of the user\u2019s desktop without requiring any additional permissions.<\/p>\n\n\n\n<p>The flaw works by bypassing the Transparency Consent and Control (TCC) framework, which controls what resources applications have access to. For example \u2013 granting&nbsp; video collaboration software access to the webcam and microphone, in order to participate in virtual meetings. Then, the exploit could allow an attacker to gain Full Disk Access, Screen Recording, or other permissions without requiring the user\u2019s explicit consent.<\/p>\n\n\n\n<p>Good news is that Apple already addressed the vulnerability in the latest version of macOS, Big Sur 11.4.<\/p>\n\n\n\n<p><a href=\"https:\/\/threatpost.com\/apple-patches-zero-day-flaw-in-macos-that-allows-for-sneaky-screenshots\/166428\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-4\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"m1racles-the-unpatchable-bug-in-apple-m1-chips-is-an-effect-of-its-design\"><strong>M1RACLES, the unpatchable bug in Apple M1 chips is an effect of its design<\/strong><\/h2>\n\n\n<p>Software engineer Hector Martin from Asahi Linux has discovered a vulnerability (CVE-2021-30747) in the new Apple M1 chips, dubbed M1RACLES, that cannot be fixed.<\/p>\n\n\n\n<p>The M1RACLES vulnerability allows two apps running on the same device to exchange data through a covert channel at the CPU\u2019s level, without using memory, sockets, files, or any other normal operating system features<\/p>\n\n\n\n<p>The flaw stems from the fact that the Arm system register encoded as s3_5_c15_c10_1 contains two bits that can be read and written at EL0 (Exception Level 0, application level privilege) from all cores simultaneously.<\/p>\n\n\n\n<figure class=\"wp-block-embed is-type-video is-provider-youtube wp-block-embed-youtube wp-embed-aspect-16-9 wp-has-aspect-ratio\"><div class=\"wp-block-embed__wrapper\">\n<div class=\"atbs-responsive-video\"><iframe loading=\"lazy\" title=\"M1RACLES: Bad Apple!! on a bad Apple (M1 vulnerability)\" width=\"1200\" height=\"675\" src=\"https:\/\/www.youtube.com\/embed\/hLQKrEh6w7M?feature=oembed\" frameborder=\"0\" allow=\"accelerometer; autoplay; clipboard-write; encrypted-media; gyroscope; picture-in-picture; web-share\" referrerpolicy=\"strict-origin-when-cross-origin\" allowfullscreen><\/iframe><\/div>\n<\/div><\/figure>\n\n\n\n<p>The issue can only be fixed with a redesign of the circuits, but the good news is that the severity of the vulnerability is rather low. The bug could be exploited to carry out cross-app tracking by some shady advertising companies for example\u2026 And it can abuse only apps already installed on a device. Researchers reported the issue to Apple, but it is not clear if the company will plan to fix it.<\/p>\n\n\n\n<p><a href=\"https:\/\/securityaffairs.co\/wordpress\/118310\/security\/apple-m1-chips-m1racles-flaw.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Source<\/a><\/p>\n\n\n\n<div style=\"height:30px\" aria-hidden=\"true\" class=\"wp-block-spacer\"><\/div>\n\n\n\n<a name=\"paragraph-5\"><\/a>\n\n\n<h2 class=\"wp-block-heading\" id=\"do-you-have-thirst-for-knowledge-there-is-ten-more-cybersecurity-stories-below\">Do you have thirst for knowledge? There is ten more cybersecurity stories below<\/h2>\n\n\n<p>1. Newly Discovered Bugs in VSCode Extensions Could Lead to Supply Chain Attacks (<a href=\"https:\/\/thehackernews.com\/2021\/05\/newly-discovered-bugs-in-vscode.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">The Hacker News<\/a>)<br>2. <a href=\"https:\/\/xopero.com\/blog\/en\/microsoft-office-365-applications-overview\/\">Office 365<\/a> bug: Exchange Online, Outlook emails sent to junk folder (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/office-365-bug-exchange-online-outlook-emails-sent-to-junk-folder\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<br>3. BazaLoader Masquerades as Movie-Streaming Service (<a href=\"https:\/\/threatpost.com\/bazaloader-fake-movie-streaming-service\/166489\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Threat Post<\/a>)<br>4. Zeppelin ransomware comes back to life with updated versions (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/zeppelin-ransomware-comes-back-to-life-with-updated-versions\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<br>5. Bluetooth bugs could allow attackers to impersonate devices (<a href=\"http:\/\/welivesecurity.com\/2021\/05\/26\/bluetooth-bugs-allow-attackers-impersonate-devices\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">We Live Security<\/a>)<br>6. Hackers compromised Japanese government offices via Fujitsu\u2018s ProjectWEB tool (<a href=\"https:\/\/securityaffairs.co\/wordpress\/118318\/data-breach\/fujitsu-projectweb-hack.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>7. Google Chrome now lets you run more commands via the address bar (<a href=\"https:\/\/www.bleepingcomputer.com\/news\/google\/google-chrome-now-lets-you-run-more-commands-via-the-address-bar\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Bleeping Computer<\/a>)<br>8. Microsoft warns of current Nobelium phishing campaign impersonating USAID (<a href=\"https:\/\/www.zdnet.com\/article\/microsoft-warns-of-current-nobelium-phishing-campaign-impersonating-usaid\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">ZDNet<\/a>)<br>9. Secure Search is a Browser Hijacker \u2013 How to Remove it (<a href=\"https:\/\/securityaffairs.co\/wordpress\/118380\/security\/how-remove-secured-search.html\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Security Affairs<\/a>)<br>10. SolarWinds hackers using NativeZone backdoor against 24 countries (<a href=\"https:\/\/www.hackread.com\/solarwinds-hackers-return-nativezone-backdoor\/\" target=\"_blank\" rel=\"noreferrer noopener nofollow\">Hack Read<\/a>)<\/p>\n\n\n","protected":false},"excerpt":{"rendered":"<p>Last week turned out to be extremely unfavorable for Apple. First, the world heard about a new 0-day vulnerability that allows attackers to secretly perform print screens. Yes, let\u2019s forget about any privacy\u2026 And then just a few days later, news about M1RACLES has come to our attention too. What is all the hype about? The bug is a result of a flaw in the M1 design. And what is even worse\u2026 That information you will find below. In this issue, we also describe a new variant of the Rowhammer attack. Half-Double &#8211; this is the name it got &#8211; [&hellip;]<\/p>\n","protected":false},"author":1,"featured_media":2447,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[470],"tags":[],"class_list":["post-4130","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-cybersec-news","post--single"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.4 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>New critical security bug in VMware vCenter allows a full takeover<\/title>\n<meta name=\"description\" content=\"Today&#039;s Security Center opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\/10 CVSS!)...\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/\" \/>\n<meta property=\"og:locale\" content=\"pl_PL\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"New critical security bug in VMware vCenter allows a full takeover\" \/>\n<meta property=\"og:description\" content=\"Today&#039;s Security Center opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\/10 CVSS!)...\" \/>\n<meta property=\"og:url\" content=\"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/\" \/>\n<meta property=\"og:site_name\" content=\"Xopero Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/XoperoSoftware\/\" \/>\n<meta property=\"article:published_time\" content=\"2021-05-31T07:36:22+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2024-05-15T10:56:02+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png\" \/>\n\t<meta property=\"og:image:width\" content=\"1843\" \/>\n\t<meta property=\"og:image:height\" content=\"481\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/png\" \/>\n<meta name=\"author\" content=\"xopero_blogger\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:site\" content=\"@xoperobackup\" \/>\n<meta name=\"twitter:label1\" content=\"Napisane przez\" \/>\n\t<meta name=\"twitter:data1\" content=\"xopero_blogger\" \/>\n\t<meta name=\"twitter:label2\" content=\"Szacowany czas czytania\" \/>\n\t<meta name=\"twitter:data2\" content=\"5 minut\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/\"},\"author\":{\"name\":\"xopero_blogger\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\"},\"headline\":\"New critical security bug in VMware vCenter allows a full takeover\",\"datePublished\":\"2021-05-31T07:36:22+00:00\",\"dateModified\":\"2024-05-15T10:56:02+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/\"},\"wordCount\":1079,\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"articleSection\":[\"Cybersec news\"],\"inLanguage\":\"pl-PL\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/\",\"name\":\"New critical security bug in VMware vCenter allows a full takeover\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"datePublished\":\"2021-05-31T07:36:22+00:00\",\"dateModified\":\"2024-05-15T10:56:02+00:00\",\"description\":\"Today's Security Center opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\\\/10 CVSS!)...\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#breadcrumb\"},\"inLanguage\":\"pl-PL\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#primaryimage\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2020\\\/04\\\/security-center-en.png\",\"width\":1843,\"height\":481},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/en\\\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Strona g\u0142\u00f3wna\",\"item\":\"https:\\\/\\\/xopero.com\\\/blog\\\/pl\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"New critical security bug in VMware vCenter allows a full takeover\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"name\":\"Xopero Blog\",\"description\":\"Backup &amp; Recovery\",\"publisher\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/xopero.com\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pl-PL\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#organization\",\"name\":\"Xopero Software\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"contentUrl\":\"https:\\\/\\\/xopero.com\\\/blog\\\/wp-content\\\/uploads\\\/2019\\\/03\\\/xopero-niebieskie.png\",\"width\":500,\"height\":132,\"caption\":\"Xopero Software\"},\"image\":{\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/XoperoSoftware\\\/\",\"https:\\\/\\\/x.com\\\/xoperobackup\",\"https:\\\/\\\/www.linkedin.com\\\/company\\\/opero-sp-z-o-o-\\\/?viewAsMember=true\",\"https:\\\/\\\/www.youtube.com\\\/channel\\\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/xopero.com\\\/blog\\\/#\\\/schema\\\/person\\\/cab3d3cda6e8a1aecfa8abea8827b17c\",\"name\":\"xopero_blogger\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pl-PL\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g\",\"caption\":\"xopero_blogger\"},\"sameAs\":[\"https:\\\/\\\/xopero.com\"],\"url\":\"https:\\\/\\\/xopero.com\\\/blog\\\/author\\\/xopero_blogger\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"New critical security bug in VMware vCenter allows a full takeover","description":"Today's Security Center opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\/10 CVSS!)...","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/","og_locale":"pl_PL","og_type":"article","og_title":"New critical security bug in VMware vCenter allows a full takeover","og_description":"Today's Security Center opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\/10 CVSS!)...","og_url":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/","og_site_name":"Xopero Blog","article_publisher":"https:\/\/www.facebook.com\/XoperoSoftware\/","article_published_time":"2021-05-31T07:36:22+00:00","article_modified_time":"2024-05-15T10:56:02+00:00","og_image":[{"width":1843,"height":481,"url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","type":"image\/png"}],"author":"xopero_blogger","twitter_card":"summary_large_image","twitter_creator":"@xoperobackup","twitter_site":"@xoperobackup","twitter_misc":{"Napisane przez":"xopero_blogger","Szacowany czas czytania":"5 minut"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#article","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/"},"author":{"name":"xopero_blogger","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c"},"headline":"New critical security bug in VMware vCenter allows a full takeover","datePublished":"2021-05-31T07:36:22+00:00","dateModified":"2024-05-15T10:56:02+00:00","mainEntityOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/"},"wordCount":1079,"publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","articleSection":["Cybersec news"],"inLanguage":"pl-PL"},{"@type":"WebPage","@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/","url":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/","name":"New critical security bug in VMware vCenter allows a full takeover","isPartOf":{"@id":"https:\/\/xopero.com\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#primaryimage"},"image":{"@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#primaryimage"},"thumbnailUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","datePublished":"2021-05-31T07:36:22+00:00","dateModified":"2024-05-15T10:56:02+00:00","description":"Today's Security Center opens the news about a new critical bug detected in VMware vCenter. Given the scale of the threat (9.8\/10 CVSS!)...","breadcrumb":{"@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#breadcrumb"},"inLanguage":"pl-PL","potentialAction":[{"@type":"ReadAction","target":["https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/"]}]},{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#primaryimage","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2020\/04\/security-center-en.png","width":1843,"height":481},{"@type":"BreadcrumbList","@id":"https:\/\/xopero.com\/blog\/en\/new-critical-security-bug-in-vmware-vcenter-allows-a-full-takeover\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Strona g\u0142\u00f3wna","item":"https:\/\/xopero.com\/blog\/pl\/"},{"@type":"ListItem","position":2,"name":"New critical security bug in VMware vCenter allows a full takeover"}]},{"@type":"WebSite","@id":"https:\/\/xopero.com\/blog\/#website","url":"https:\/\/xopero.com\/blog\/","name":"Xopero Blog","description":"Backup &amp; Recovery","publisher":{"@id":"https:\/\/xopero.com\/blog\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/xopero.com\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pl-PL"},{"@type":"Organization","@id":"https:\/\/xopero.com\/blog\/#organization","name":"Xopero Software","url":"https:\/\/xopero.com\/blog\/","logo":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","contentUrl":"https:\/\/xopero.com\/blog\/wp-content\/uploads\/2019\/03\/xopero-niebieskie.png","width":500,"height":132,"caption":"Xopero Software"},"image":{"@id":"https:\/\/xopero.com\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/XoperoSoftware\/","https:\/\/x.com\/xoperobackup","https:\/\/www.linkedin.com\/company\/opero-sp-z-o-o-\/?viewAsMember=true","https:\/\/www.youtube.com\/channel\/UCRPWyeo1apjSgkDW3hZpB9g?reload=9"]},{"@type":"Person","@id":"https:\/\/xopero.com\/blog\/#\/schema\/person\/cab3d3cda6e8a1aecfa8abea8827b17c","name":"xopero_blogger","image":{"@type":"ImageObject","inLanguage":"pl-PL","@id":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/49b4a2bbd1b6df951fc556f7478f5fb20bb41aeebf08473e459b28c5da9947f7?s=96&d=mm&r=g","caption":"xopero_blogger"},"sameAs":["https:\/\/xopero.com"],"url":"https:\/\/xopero.com\/blog\/author\/xopero_blogger\/"}]}},"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4130","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/comments?post=4130"}],"version-history":[{"count":12,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4130\/revisions"}],"predecessor-version":[{"id":5853,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/posts\/4130\/revisions\/5853"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media\/2447"}],"wp:attachment":[{"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/media?parent=4130"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/categories?post=4130"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/xopero.com\/blog\/wp-json\/wp\/v2\/tags?post=4130"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}