Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

Posted on January 24, 2026January 24, 2026 By CWS

Ravie LakshmananJan 24, 2026Vulnerability / Enterprise Safety
The U.S. Cybersecurity and Infrastructure Safety Company (CISA) on Friday added a important safety flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Recognized Exploited Vulnerabilities (KEV) catalog, citing proof of energetic exploitation within the wild.
The vulnerability in query is CVE-2024-37079 (CVSS rating: 9.8), which refers to a heap overflow within the implementation of the DCE/RPC protocol that might permit a nasty actor with community entry to vCenter Server to realize distant code execution by sending a specifically crafted community packet.
It was resolved by Broadcom in June 2024, together with CVE-2024-37080, one other heap overflow within the implementation of the DCE/RPC protocol that might result in distant code execution. Chinese language cybersecurity firm QiAnXin LegendSec researchers Hao Zheng and Zibo Li had been credited with discovering and reporting the problems.

In a presentation on the Black Hat Asia safety convention in April 2025, the researchers stated the 2 flaws are a part of a set of 4 vulnerabilities – three heap overflows and one privilege escalation – that had been found within the DCE/RPC service. The 2 different flaws, CVE-2024-38812 and CVE-2024-38813, had been patched by Broadcom in September 2024.
Specifically, they discovered that one of many heap overflow vulnerabilities might be chained with the privilege escalation vulnerability (CVE-2024-38813) to realize unauthorized distant root entry and in the end achieve management over ESXi.
It is at present not identified how CVE-2024-37079 is being exploited, if it is the work of any identified menace actor or group, or the size of such assaults. Nonetheless, Broadcom has since up to date its advisory to formally verify in-the-wild abuse of the vulnerability.
“Broadcom has info to recommend that exploitation of CVE-2024-37079 has occurred within the wild,” the corporate stated in its replace.
In mild of energetic exploitation, Federal Civilian Government Department (FCEB) companies are required to replace to the most recent model by February 13, 2026, for optimum safety.

The Hacker News Tags:Actively, Adds, Catalog, CISA, CVE202437079, Exploited, Flaw, KEV, vCenter, VMware

Post navigation

Previous Post: Microsoft Launches Open-Source WinApp CLI to Streamline Windows App Development
Next Post: Who Approved This Agent? Rethinking Access, Accountability, and Risk in the Age of AI Agents

Related Posts

iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More iPhone Spyware, Microsoft 0-Day, TokenBreak Hack, AI Data Leaks and More The Hacker News
New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers New Windows RAT Evades Detection for Weeks Using Corrupted DOS and PE Headers The Hacker News
Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations Critical Unpatched SharePoint Zero-Day Actively Exploited, Breaches 75+ Global Organizations The Hacker News
State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments State-Backed HazyBeacon Malware Uses AWS Lambda to Steal Data from SE Asian Governments The Hacker News
Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks Pre-Auth Exploit Chains Found in Commvault Could Enable Remote Code Execution Attacks The Hacker News
North Korea-Linked UNC1069 Targets Crypto with AI Attacks North Korea-Linked UNC1069 Targets Crypto with AI Attacks The Hacker News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Feiniu NAS Devices Targeted in Major Botnet Attack
  • Rapid SSH Worm Exploits Linux Systems with Credential Stuffing
  • Odido Telecom Hacked: 6.2 Million Accounts Compromised
  • Lazarus Group Targets npm and PyPI with Malicious Packages
  • DragonForce Ransomware Group’s Expanding Cartel Operations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News