Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks

CISA Warns of Critical VMware vCenter RCE Vulnerability Now Exploited in Attacks

Posted on January 24, 2026January 24, 2026 By CWS

The Cybersecurity and Infrastructure Safety Company (CISA) has added a vital vulnerability affecting Broadcom’s VMware vCenter Server to its Recognized Exploited Vulnerabilities (KEV) catalog.

This addition confirms that energetic exploitation of CVE-2024-37079 has been detected within the wild, posing a big danger to enterprise environments that depend on vCenter for virtualization administration.

The vulnerability, initially disclosed by Broadcom, is classed as an out-of-bounds write situation located throughout the implementation of the DCERPC (Distributed Computing Surroundings / Distant Process Calls) protocol.

Profitable exploitation permits a malicious actor with community entry to the vCenter Server to execute distant code, probably gaining full management over the affected system.

Technical Evaluation of CVE-2024-37079

This flaw stems from improper reminiscence dealing with within the DCERPC protocol implementation. An unauthenticated attacker can set off the vulnerability by sending specifically crafted community packets to the vCenter Server.

As a result of vCenter Server is the centralized administration utility for managing VMware vSphere environments, a compromise right here typically offers attackers with lateral motion capabilities throughout all the virtualized infrastructure.

Whereas the vulnerability is related to CWE-787 (Out-of-bounds Write), it’s notably harmful as a result of it doesn’t require person interplay. The assault vector is strictly network-based.

Though CISA’s present information lists the “Recognized To Be Utilized in Ransomware Campaigns” standing as “Unknown,” the character of the flaw makes it a extremely engaging entry level for preliminary entry brokers and ransomware teams.

By including CVE-2024-37079 to the KEV catalog on January 23, 2026, CISA has mandated that Federal Civilian Government Department (FCEB) companies remediate this vulnerability by February 13, 2026.

The company advises all organizations, not simply federal entities, to prioritize patching this flaw instantly. The really useful motion is to use the vendor-provided mitigations or discontinue use of the product if mitigations are unavailable.

Broadcom has launched updates for vCenter Server to handle this situation, and directors are urged to improve to the newest safe variations.

To safe virtualization infrastructure in opposition to this menace, safety groups ought to take the next steps:

Patch Instantly: Apply the related patches offered in Broadcom’s safety advisory.

Community Segmentation: Make sure that vCenter Server interfaces aren’t uncovered to the general public web. Limit entry to the vCenter administration interface to trusted administrative networks solely.

Monitor Visitors: Implement community monitoring to detect anomalous DCERPC visitors directed at vCenter servers.

Evaluation Logs: Audit entry logs for unauthorized makes an attempt to hook up with the administration interface.

With the due date set for mid-February, organizations have a restricted window to handle this vital publicity earlier than it turns into an ordinary goal for automated exploitation instruments.

Comply with us on Google Information, LinkedIn, and X for each day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Attacks, CISA, Critical, Exploited, RCE, vCenter, VMware, Vulnerability, Warns

Post navigation

Previous Post: Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
Next Post: Hackers Use ‘rn’ Typo Trick to Impersonate Marriott in New Phishing Attack

Related Posts

Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Iranian APTs Hackers Actively Attacking Transportation and Manufacturing Sectors Cyber Security News
Google Vulnerability Let Attackers Access Any Google User Phone Number Google Vulnerability Let Attackers Access Any Google User Phone Number Cyber Security News
Conti Group Member Responsible for Deploying Ransomware Extradited to USA Conti Group Member Responsible for Deploying Ransomware Extradited to USA Cyber Security News
AI Browsers Bypass Content PayWall Mimicking as a Human-User AI Browsers Bypass Content PayWall Mimicking as a Human-User Cyber Security News
Web-to-App Funnels: Pros And Cons Web-to-App Funnels: Pros And Cons Cyber Security News
Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Threat Actors Weaponizes Judicial Documents to Deliver PureHVNC RAT Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News