HomeVulnerabilityCISA says essential VMware RCE flaw now actively exploited

CISA says essential VMware RCE flaw now actively exploited

The U.S. Cybersecurity and Infrastructure Safety Company (CISA) has flagged a essential VMware vCenter Server vulnerability as actively exploited and ordered federal businesses to safe their servers inside three weeks.

Patched in June 2024, this security flaw (CVE-2024-37079) stems from a heap overflow weak spot within the DCERPC protocol implementation of vCenter Server (a Broadcom VMware vSphere administration platform that helps admins handle ESXi hosts and digital machines).

Risk actors with community entry to vCenter Server could exploit this vulnerability by sending a specifically crafted community packet that may set off distant code execution in low-complexity assaults that do not require privileges on the focused methods or consumer interplay.

Wiz

There aren’t any workarounds or mitigations for CVE-2024-37079, so Broadcom suggested prospects to use security patches to the most recent vCenter Server and Cloud Basis releases as quickly as attainable.

On Friday, CISA added the vulnerability to its catalog of flaws exploited within the wild, giving Federal Civilian Government Department (FCEB) businesses three weeks to safe weak methods by February thirteenth, as mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021.

See also  Essential Langflow Flaw Added to CISA KEV Listing Amid Ongoing Exploitation Proof

FCEB businesses are non-military U.S. govt department businesses, such because the Division of State, the Division of Justice, the Division of Power, and the Division of Homeland Safety.

“Such a vulnerability is a frequent assault vector for malicious cyber actors and poses vital dangers to the federal enterprise,” CISA warned. “Apply mitigations per vendor directions, comply with relevant BOD 22-01 steerage for cloud companies, or discontinue use of the product if mitigations are unavailable.”

The identical day, Broadcom up to date its authentic advisory and confirmed that it is also conscious that CVE-2024-37079 has been exploited within the wild.

“Broadcom has data to counsel that exploitation of CVE-2024-37079 has occurred within the wild,” it cautioned.

In October, CISA additionally ordered U.S. authorities businesses to patch a high-severity vulnerability (CVE-2025-41244) in Broadcom’s VMware Aria Operations and VMware Instruments software program, which Chinese language hackers had been exploiting in zero-day assaults since October 2024.

Final yr, Broadcom additionally launched security patches to deal with two high-severity VMware NSX flaws (CVE-2025-41251 and CVE-2025-41252) reported by the U.S. Nationwide Safety Company (NSA) and stuck three different actively exploited VMware zero-days (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) reported by Microsoft.

- Advertisment -spot_img
RELATED ARTICLES

LEAVE A REPLY

Please enter your comment!
Please enter your name here

- Advertisment -

Most Popular