Article Details

Scrape Timestamp (UTC): 2026-01-23 22:06:26.493

Source: https://www.theregister.com/2026/01/23/critical_vmware_vcenter_server_bug/

Original Article Text

Click to Toggle View

Patch or die: VMware vCenter Server bug fixed in 2024 under attack today. If you skipped it back then, now’s a very good time. You've got to keep your software updated. Some unknown miscreants are exploiting a critical VMware vCenter Server bug more than a year after Broadcom patched the flaw. The vulnerability, tracked as CVE-2024-37079, is an out-of-bounds write flaw in vCenter Server's implementation of the DCERPC protocol that earned a 9.8 out of 10 CVSS rating. In other words: it's almost as bad as it gets.  DCERPC, which stands for Distributed Computing Environment/Remote Procedure Calls, allows software to invoke procedures and services on a remote system across a network. This bug can be abused by someone with network access to vCenter Server to send specially crafted network packets, potentially leading to remote code execution, and on Friday, both the vendor and the feds warned that this - or something along these lines - is happening. "Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild," the vendor warned in an update to its June 18, 2024 security advisory.  Also on Friday, the US Cybersecurity and Infrastructure Security Agency (CISA) added this critical security hole to its Known Exploited Vulnerabilities (KEV) Catalog. This means federal agencies must patch the flaw by February 13 - again, we must note that Broadcom issued a software update that fixes this CVE more than a year and a half ago, and June 2024 would have been the optimal time to deploy the patch. CISA's KEV lists the bug's use in ransomware campaigns as "unknown," and Broadcom didn't provide any details about the scope of exploitation, or respond to The Register's inquiries about CVE-2024-37079's abuse. We'll update this story as we learn more about who is abusing this flaw, and what they are doing with the illicit access to enterprises' vCenter Servers. VulnCheck VP of security research Caitlin Condon told The Register that virtualization infrastructure - including Broadcom's vCenter Server - is a favorite target for both government-backed hackers and financially motivated cybercriminals.  "As an example, CVE-2023-34048, a prior vulnerability in vCenter Server's DCERPC protocol, was exploited by at least three known China-nexus threat actors (Fire Ant, Warp Panda, and UNC3886)," Condon said. Condon said she's not surprised to see the bug being exploited by attackers considering details about the vulnerability have been public for more than a year.  "It's common to see threat actors - including state-sponsored groups - opportunistically leveraging even older public vulnerability information to conduct new attacks, so it's not terribly surprising that the vulnerability has seen exploitation in the wild," she said.  "While there are no immediate details on threat actor attribution or attacker behavior, vCenter Server should never, ever be exposed to the public internet, so it's likely the adversary already had a foothold in the victim environment," Condon added.

Daily Brief Summary

VULNERABILITIES // Critical VMware vCenter Server Flaw Exploited Despite 2024 Patch

A critical vulnerability in VMware vCenter Server, CVE-2024-37079, is being actively exploited over a year after a patch was released.

The flaw, an out-of-bounds write in the DCERPC protocol, presents a severe risk with a CVSS score of 9.8, potentially allowing remote code execution.

Both Broadcom and CISA have issued warnings, with CISA adding the vulnerability to its Known Exploited Vulnerabilities Catalog, mandating federal agencies to patch by February 13.

Despite the patch's availability since June 2024, exploitation continues, with details on the scope and actors involved still unclear.

Virtualization infrastructure, including vCenter Server, remains a prime target for both nation-state actors and cybercriminals.

Previous vulnerabilities in the same protocol have been exploited by China-linked threat groups, indicating the persistent interest in such targets.

Organizations are urged to ensure vCenter Servers are not exposed to the internet and to apply patches promptly to mitigate risks.