Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
2024 VMware Flaw Now in Attackers’ Crosshairs

2024 VMware Flaw Now in Attackers’ Crosshairs

Posted on January 26, 2026January 26, 2026 By CWS

Menace actors have exploited a critical-severity VMware vCenter Server vulnerability disclosed in 2024, in keeping with recent warnings from CISA and Broadcom.

Tracked as CVE-2024-37079 (CVSS rating of 9.8), the flaw is described as an out-of-bounds write subject within the Distributed Computing Atmosphere/Distant Process Calls (DCERPC) protocol implementation of vCenter Server.

Incorrect bounds checking in the course of the processing of community packets might lead to an overflow of heap reminiscence, resulting in distant code execution.

The safety defect could be exploited by distant attackers with entry to vCenter Server by way of specifically crafted community packets.

On Friday, the US cybersecurity company CISA added CVE-2024-37079 to its Recognized Exploited Vulnerabilities (KEV) catalog, warning federal companies of its in-the-wild exploitation.

Patches for the weak spot had been launched in June 2024. On Friday, VMware father or mother firm Broadcom up to date its preliminary advisory so as to add a notice on the bug’s abuse.Commercial. Scroll to proceed studying.

“Broadcom has data to counsel that exploitation of CVE-2024-37079 has occurred within the wild,” the notice reads.

Neither CISA nor Broadcom has offered particulars on the noticed assaults, and there don’t seem like any public studies describing in-the-wild exploitation. 

Now that the CVE has been added to the KEV checklist, federal companies have three weeks to determine and patch susceptible vCenter Server deployments of their environments, as mandated by Binding Operational Directive (BOD) 22-01.

All organizations are suggested to assessment CISA’s KEV catalog and apply out there fixes and mitigations for the vulnerabilities it comprises.

Associated: Fortinet Confirms FortiCloud SSO Exploitation In opposition to Patched Gadgets

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Associated: Recent SmarterMail Flaw Exploited for Admin Entry

Security Week News Tags:Attackers, Crosshairs, Flaw, VMware

Post navigation

Previous Post: Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update
Next Post: Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat

Related Posts

Chinese Hackers Target Chinese Users With RAT, Rootkit Chinese Hackers Target Chinese Users With RAT, Rootkit Security Week News
Agentic Security Firm 7AI Raises 0 Million Agentic Security Firm 7AI Raises $130 Million Security Week News
Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People Myanmar Military Shuts Down Major Cybercrime Center and Detains Over 2,000 People Security Week News
VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks VS Code Flaws in GitHub Codespaces Risk Supply Chain Attacks Security Week News
CISA Warns AMI BMC Vulnerability Exploited in the Wild CISA Warns AMI BMC Vulnerability Exploited in the Wild Security Week News
UK Imposes M Fine on Reddit for Child Data Breaches UK Imposes $20M Fine on Reddit for Child Data Breaches Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required
  • Iranian Hackers Compromise FBI Director’s Email, Attack Stryker
  • Stocks in Cybersecurity Dip as Anthropic Tests Cutting-Edge AI

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark