Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
2024 VMware Flaw Now in Attackers’ Crosshairs

2024 VMware Flaw Now in Attackers’ Crosshairs

Posted on January 26, 2026January 26, 2026 By CWS

Menace actors have exploited a critical-severity VMware vCenter Server vulnerability disclosed in 2024, in keeping with recent warnings from CISA and Broadcom.

Tracked as CVE-2024-37079 (CVSS rating of 9.8), the flaw is described as an out-of-bounds write subject within the Distributed Computing Atmosphere/Distant Process Calls (DCERPC) protocol implementation of vCenter Server.

Incorrect bounds checking in the course of the processing of community packets might lead to an overflow of heap reminiscence, resulting in distant code execution.

The safety defect could be exploited by distant attackers with entry to vCenter Server by way of specifically crafted community packets.

On Friday, the US cybersecurity company CISA added CVE-2024-37079 to its Recognized Exploited Vulnerabilities (KEV) catalog, warning federal companies of its in-the-wild exploitation.

Patches for the weak spot had been launched in June 2024. On Friday, VMware father or mother firm Broadcom up to date its preliminary advisory so as to add a notice on the bug’s abuse.Commercial. Scroll to proceed studying.

“Broadcom has data to counsel that exploitation of CVE-2024-37079 has occurred within the wild,” the notice reads.

Neither CISA nor Broadcom has offered particulars on the noticed assaults, and there don’t seem like any public studies describing in-the-wild exploitation. 

Now that the CVE has been added to the KEV checklist, federal companies have three weeks to determine and patch susceptible vCenter Server deployments of their environments, as mandated by Binding Operational Directive (BOD) 22-01.

All organizations are suggested to assessment CISA’s KEV catalog and apply out there fixes and mitigations for the vulnerabilities it comprises.

Associated: Fortinet Confirms FortiCloud SSO Exploitation In opposition to Patched Gadgets

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Associated: Recent SmarterMail Flaw Exploited for Admin Entry

Security Week News Tags:Attackers, Crosshairs, Flaw, VMware

Post navigation

Previous Post: Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update
Next Post: Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat

Related Posts

Cogent Secures M to Enhance AI for Vulnerability Management Cogent Secures $42M to Enhance AI for Vulnerability Management Security Week News
Starbucks Employee Data Breach Exposes Sensitive Information Starbucks Employee Data Breach Exposes Sensitive Information Security Week News
FBI Security Breach, Iranian Camera Hack, and More Cyber Developments FBI Security Breach, Iranian Camera Hack, and More Cyber Developments Security Week News
Steelmaker Nucor Says Hackers Stole Data in Recent Attack Steelmaker Nucor Says Hackers Stole Data in Recent Attack Security Week News
OpenClaw Faces Ongoing Security Challenges with New Open Source Tool OpenClaw Faces Ongoing Security Challenges with New Open Source Tool Security Week News
Sophisticated Phishing Attack Targets Security Firm Executive Sophisticated Phishing Attack Targets Security Firm Executive Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat
  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark