### [CVE-2024-38813](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38813) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-250&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-273%20Improper%20Check%20for%20Dropped%20Privileges&color=brightgreen) ### Description The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet. ### POC #### Reference No PoCs from references. #### Github - https://github.com/packetinside/CISA_BOT - https://github.com/ums91/CISA_BOT