Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
2024 VMware Flaw Now in Attackers’ Crosshairs

2024 VMware Flaw Now in Attackers’ Crosshairs

Posted on January 26, 2026January 26, 2026 By CWS

Menace actors have exploited a critical-severity VMware vCenter Server vulnerability disclosed in 2024, in keeping with recent warnings from CISA and Broadcom.

Tracked as CVE-2024-37079 (CVSS rating of 9.8), the flaw is described as an out-of-bounds write subject within the Distributed Computing Atmosphere/Distant Process Calls (DCERPC) protocol implementation of vCenter Server.

Incorrect bounds checking in the course of the processing of community packets might lead to an overflow of heap reminiscence, resulting in distant code execution.

The safety defect could be exploited by distant attackers with entry to vCenter Server by way of specifically crafted community packets.

On Friday, the US cybersecurity company CISA added CVE-2024-37079 to its Recognized Exploited Vulnerabilities (KEV) catalog, warning federal companies of its in-the-wild exploitation.

Patches for the weak spot had been launched in June 2024. On Friday, VMware father or mother firm Broadcom up to date its preliminary advisory so as to add a notice on the bug’s abuse.Commercial. Scroll to proceed studying.

“Broadcom has data to counsel that exploitation of CVE-2024-37079 has occurred within the wild,” the notice reads.

Neither CISA nor Broadcom has offered particulars on the noticed assaults, and there don’t seem like any public studies describing in-the-wild exploitation. 

Now that the CVE has been added to the KEV checklist, federal companies have three weeks to determine and patch susceptible vCenter Server deployments of their environments, as mandated by Binding Operational Directive (BOD) 22-01.

All organizations are suggested to assessment CISA’s KEV catalog and apply out there fixes and mitigations for the vulnerabilities it comprises.

Associated: Fortinet Confirms FortiCloud SSO Exploitation In opposition to Patched Gadgets

Associated: Organizations Warned of Exploited Zimbra Collaboration Vulnerability

Associated: Infotainment, EV Charger Exploits Earn Hackers $1M at Pwn2Own Automotive 2026

Associated: Recent SmarterMail Flaw Exploited for Admin Entry

Security Week News Tags:Attackers, Crosshairs, Flaw, VMware

Post navigation

Previous Post: Microsoft Investigating Boot Failure Issues With Windows 11, version 25H2 Following January Update
Next Post: Threat Actors Fake BSODs and Trusted Build Tools to Bypass Defenses and Deploy DCRat

Related Posts

SAP’s January 2026 Security Updates Patch Critical Vulnerabilities SAP’s January 2026 Security Updates Patch Critical Vulnerabilities Security Week News
Claude Code Faces Security Flaw After Source Leak Claude Code Faces Security Flaw After Source Leak Security Week News
Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights Australian Man Sentenced to Prison for Wi-Fi Attacks at Airports and on Flights Security Week News
MacSync macOS Malware Distributed via Signed Swift Application MacSync macOS Malware Distributed via Signed Swift Application Security Week News
Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Dutch Intelligence Agencies Say Russian Hackers Stole Police Data in Cyberattack Security Week News
Frame Security Launches with M for AI Cyber Training Frame Security Launches with $50M for AI Cyber Training Security Week News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • May 2026
  • April 2026
  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Critical Vulnerability in MongoDB Risks Data Exposure
  • Windows Zero-Day Exploits: YellowKey and GreenPlasma Revealed
  • Fragnesia Linux Kernel Vulnerability Allows Root Access
  • NGINX Vulnerability Allows Remote Code Execution
  • Critical 18-Year NGINX Vulnerability Enables Remote Code Execution

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark