Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

2024 VMware Flaw Now in Attackers’ Crosshairs

The critical-severity vulnerability can be exploited via crafted network packets for remote code execution.

VMware

Threat actors have exploited a critical-severity VMware vCenter Server vulnerability disclosed in 2024, according to fresh warnings from CISA and Broadcom.

Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server.

Incorrect bounds checking during the processing of network packets could result in an overflow of heap memory, leading to remote code execution.

The security defect can be exploited by remote attackers with access to vCenter Server via specially crafted network packets.

On Friday, the US cybersecurity agency CISA added CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog, warning federal agencies of its in-the-wild exploitation.

Patches for the weakness were released in June 2024. On Friday, VMware parent company Broadcom updated its initial advisory to add a note on the bug’s abuse.

Advertisement. Scroll to continue reading.

“Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild,” the note reads.

Neither CISA nor Broadcom has provided details on the observed attacks, and there do not appear to be any public reports describing in-the-wild exploitation. 

Now that the CVE has been added to the KEV list, federal agencies have three weeks to identify and patch vulnerable vCenter Server deployments in their environments, as mandated by Binding Operational Directive (BOD) 22-01.

All organizations are advised to review CISA’s KEV catalog and apply available fixes and mitigations for the vulnerabilities it contains.

Related: Fortinet Confirms FortiCloud SSO Exploitation Against Patched Devices

Related: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Related: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Related: Fresh SmarterMail Flaw Exploited for Admin Access

Written By

Ionut Arghire is an international correspondent for SecurityWeek.

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

With "Shadow AI" usage becoming prevalent in organizations, learn how to balance the need for rapid experimentation with the rigorous controls required for enterprise-grade deployment.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Neill Feather has been named Chief Executive Officer at Point Wild.

Oasis Security has appointed Michael DeCesare as President.

Sterling Wilson has joined IGEL as Global Field CTO, Business Continuity and Disaster Recovery.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.