2024 VMware Flaw Now in Attackers’ Crosshairs
securityweekThe critical-severity vulnerability can be exploited via crafted network packets for remote code execution.


Threat actors have exploited a critical-severity VMware vCenter Server vulnerability disclosed in 2024, according to fresh warnings from CISA and Broadcom.
Tracked as CVE-2024-37079 (CVSS score of 9.8), the flaw is described as an out-of-bounds write issue in the Distributed Computing Environment/Remote Procedure Calls (DCERPC) protocol implementation of vCenter Server.
Incorrect bounds checking during the processing of network packets could result in an overflow of heap memory, leading to remote code execution.
The security defect can be exploited by remote attackers with access to vCenter Server via specially crafted network packets.
On Friday, the US cybersecurity agency CISA added CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog, warning federal agencies of its in-the-wild exploitation.
Patches for the weakness were released in June 2024. On Friday, VMware parent company Broadcom updated its initial advisory to ...
Copyright of this story solely belongs to securityweek . To see the full text click HERE

