CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the
AI Analysis
Technical Summary
CVE-2024-37079 is a heap overflow vulnerability in the DCE/RPC protocol implementation within Broadcom VMware vCenter Server, a widely used enterprise virtualization management platform. This vulnerability allows an attacker with network access to the vCenter Server to execute arbitrary code remotely by sending a specially crafted network packet. The flaw was discovered and reported by researchers Hao Zheng and Zibo Li from QiAnXin LegendSec and was patched by Broadcom in June 2024. It is part of a cluster of four vulnerabilities affecting the DCE/RPC service, including three heap overflows and one privilege escalation (CVE-2024-38813). Notably, the heap overflow can be chained with the privilege escalation flaw to achieve unauthorized remote root access, enabling attackers to gain full control over ESXi hypervisor hosts managed by vCenter. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation in the wild, although details on the threat actors or attack scale remain undisclosed. The vulnerability carries a CVSS score of 9.8, indicating critical severity. The exploitation requires no authentication and can be triggered remotely, making it highly dangerous. Broadcom has mandated Federal Civilian Executive Branch agencies to update their vCenter installations by February 13, 2026, underscoring the urgency. The vulnerability threatens the confidentiality, integrity, and availability of virtualized environments, potentially leading to full infrastructure compromise, data theft, and operational disruption.
Potential Impact
European organizations using VMware vCenter Server are at high risk due to this vulnerability. Successful exploitation can lead to remote code execution with root privileges on ESXi hosts, enabling attackers to control virtual machines, access sensitive data, disrupt services, and potentially move laterally within networks. This can severely impact sectors reliant on virtualization such as finance, healthcare, telecommunications, and critical infrastructure. The compromise of virtual infrastructure can result in data breaches, ransomware deployment, and prolonged downtime. Given VMware's widespread adoption in Europe, the threat poses a systemic risk to enterprise IT environments. Additionally, the ability to chain this vulnerability with privilege escalation increases the attack's potency, making mitigation and rapid patching essential to prevent large-scale incidents. The active exploitation status elevates the urgency for European entities to assess exposure and implement defenses promptly.
Mitigation Recommendations
1. Immediately apply the official Broadcom patches released in June 2024 for CVE-2024-37079 and related vulnerabilities (CVE-2024-38812, CVE-2024-38813). 2. Conduct a thorough inventory of VMware vCenter Server deployments to identify vulnerable versions. 3. Implement network segmentation to restrict access to vCenter Server management interfaces, limiting exposure to trusted networks and IP addresses only. 4. Employ strict firewall rules and intrusion detection/prevention systems to monitor and block suspicious DCE/RPC traffic patterns. 5. Enable and review detailed logging and alerting on vCenter Server and ESXi hosts to detect anomalous activities indicative of exploitation attempts. 6. Use multi-factor authentication and role-based access controls to minimize the risk of privilege abuse. 7. Regularly update and patch all virtualization infrastructure components to reduce attack surface. 8. Conduct penetration testing and vulnerability assessments focused on virtualization environments to validate security posture. 9. Develop and rehearse incident response plans specifically addressing virtualization platform compromises. 10. Engage with VMware and cybersecurity communities for threat intelligence sharing and best practices.
Affected Countries
Germany, France, United Kingdom, Netherlands, Italy, Spain, Sweden, Belgium, Poland, Ireland
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
Description
The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild. The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the
AI-Powered Analysis
Technical Analysis
CVE-2024-37079 is a heap overflow vulnerability in the DCE/RPC protocol implementation within Broadcom VMware vCenter Server, a widely used enterprise virtualization management platform. This vulnerability allows an attacker with network access to the vCenter Server to execute arbitrary code remotely by sending a specially crafted network packet. The flaw was discovered and reported by researchers Hao Zheng and Zibo Li from QiAnXin LegendSec and was patched by Broadcom in June 2024. It is part of a cluster of four vulnerabilities affecting the DCE/RPC service, including three heap overflows and one privilege escalation (CVE-2024-38813). Notably, the heap overflow can be chained with the privilege escalation flaw to achieve unauthorized remote root access, enabling attackers to gain full control over ESXi hypervisor hosts managed by vCenter. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog due to confirmed active exploitation in the wild, although details on the threat actors or attack scale remain undisclosed. The vulnerability carries a CVSS score of 9.8, indicating critical severity. The exploitation requires no authentication and can be triggered remotely, making it highly dangerous. Broadcom has mandated Federal Civilian Executive Branch agencies to update their vCenter installations by February 13, 2026, underscoring the urgency. The vulnerability threatens the confidentiality, integrity, and availability of virtualized environments, potentially leading to full infrastructure compromise, data theft, and operational disruption.
Potential Impact
European organizations using VMware vCenter Server are at high risk due to this vulnerability. Successful exploitation can lead to remote code execution with root privileges on ESXi hosts, enabling attackers to control virtual machines, access sensitive data, disrupt services, and potentially move laterally within networks. This can severely impact sectors reliant on virtualization such as finance, healthcare, telecommunications, and critical infrastructure. The compromise of virtual infrastructure can result in data breaches, ransomware deployment, and prolonged downtime. Given VMware's widespread adoption in Europe, the threat poses a systemic risk to enterprise IT environments. Additionally, the ability to chain this vulnerability with privilege escalation increases the attack's potency, making mitigation and rapid patching essential to prevent large-scale incidents. The active exploitation status elevates the urgency for European entities to assess exposure and implement defenses promptly.
Mitigation Recommendations
1. Immediately apply the official Broadcom patches released in June 2024 for CVE-2024-37079 and related vulnerabilities (CVE-2024-38812, CVE-2024-38813). 2. Conduct a thorough inventory of VMware vCenter Server deployments to identify vulnerable versions. 3. Implement network segmentation to restrict access to vCenter Server management interfaces, limiting exposure to trusted networks and IP addresses only. 4. Employ strict firewall rules and intrusion detection/prevention systems to monitor and block suspicious DCE/RPC traffic patterns. 5. Enable and review detailed logging and alerting on vCenter Server and ESXi hosts to detect anomalous activities indicative of exploitation attempts. 6. Use multi-factor authentication and role-based access controls to minimize the risk of privilege abuse. 7. Regularly update and patch all virtualization infrastructure components to reduce attack surface. 8. Conduct penetration testing and vulnerability assessments focused on virtualization environments to validate security posture. 9. Develop and rehearse incident response plans specifically addressing virtualization platform compromises. 10. Engage with VMware and cybersecurity communities for threat intelligence sharing and best practices.
Technical Details
- Article Source
- {"url":"https://thehackernews.com/2026/01/cisa-adds-actively-exploited-vmware.html","fetched":true,"fetchedAt":"2026-01-24T20:35:17.840Z","wordCount":896}
Threat ID: 69752d084623b1157ccddeb7
Added to database: 1/24/2026, 8:35:20 PM
Last enriched: 1/24/2026, 8:36:26 PM
Last updated: 1/26/2026, 2:11:19 PM
Views: 49
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
2024 VMware Flaw Now in Attackers’ Crosshairs
CriticalCisco Fixes Actively Exploited Zero-Day CVE-2026-20045 in Unified CM and Webex
CriticalHackers Targeting Cisco Unified CM Zero-Day
CriticalChina-Linked APT Exploited Sitecore Zero-Day in Critical Infrastructure Intrusion
CriticalCritical WordPress Modular DS Plugin Flaw Actively Exploited to Gain Admin Access
CriticalActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.