Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
2024 VMware Flaw Now in Attackers’ Crosshairs

2024 VMware Flaw Now in Attackers’ Crosshairs

Posted on January 26, 2026January 26, 2026 By CWS

Menace actors have exploited a critical-severity VMware vCenter Server vulnerability disclosed in 2024, in keeping with recent warnings from CISA and Broadcom.

Tracked as CVE-2024-37079 (CVSS rating of 9.8), the flaw is described as an out-of-bounds write subject within the Distributed Computing Atmosphere/Distant Process Calls (DCERPC) protocol implementation of vCenter Server.

Incorrect bounds checking in the course of the processing of community packets might lead to an overflow of heap reminiscence, resulting in distant code execution.

The safety defect could be exploited by distant attackers with entry to vCenter Server by way of specifically crafted community packets.

On Friday, the US cybersecurity company CISA added CVE-2024-37079 to its Recognized Exploited Vulnerabilities (KEV) catalog, warning federal companies of its in-the-wild exploitation.

Patches for the weak spot had been launched in June 2024. On Friday, VMware father or mother firm Broadcom up to date its preliminary advisory so as to add a notice on the bug’s abuse.Commercial. Scroll to proceed studying.

“Broadcom has data to counsel that exploitation of CVE-2024-37079 has occurred within the wild,” the notice reads.

Neither CISA nor Broadcom has offered particulars on the noticed assaults, and there don’t seem like any public studies describing in-the-wild exploitation. 

Now that the CVE has been added to the KEV checklist, federal companies have three weeks to determine and patch susceptible vCenter Server deployments of their environments, as mandated by Binding Operational Directive (BOD) 22-01.

All organizations are suggested to assessment CISA’s KEV catalog and apply out there fixes and mitigations for the vulnerabilities it comprises.

Associated: Fortinet Confirms FortiCloud SSO Exploitation In opposition to Patched Gadgets

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Associated: Recent SmarterMail Flaw Exploited for Admin Entry

Security Week News Tags:Attackers, Crosshairs, Flaw, VMware

Post navigation

Previous Post: Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update
Next Post: Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat

Related Posts

Microsoft Patches Actively Exploited Windows Kernel Zero-Day Microsoft Patches Actively Exploited Windows Kernel Zero-Day Security Week News
Extortion Group Leaks Millions of Records From Salesforce Hacks Extortion Group Leaks Millions of Records From Salesforce Hacks Security Week News
Auto Parts Giant LKQ Confirms Oracle EBS Breach Auto Parts Giant LKQ Confirms Oracle EBS Breach Security Week News
100,000 Impacted by Cornwell Quality Tools Data Breach  100,000 Impacted by Cornwell Quality Tools Data Breach  Security Week News
Cloudflare Outage Not Caused by Cyberattack Cloudflare Outage Not Caused by Cyberattack Security Week News
Daylight Raises  Million for AI-Powered MDR Platform Daylight Raises $33 Million for AI-Powered MDR Platform Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations
  • North Korean Hackers Exploit AI for Enhanced Cyber Attacks

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News