By using this site, you agree to the Privacy Policy and Terms of Use.
Accept
World of SoftwareWorld of SoftwareWorld of Software
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Search
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
Reading: CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
Share
Sign In
Notification Show More
Font ResizerAa
World of SoftwareWorld of Software
Font ResizerAa
  • Software
  • Mobile
  • Computing
  • Gadget
  • Gaming
  • Videos
Search
  • News
  • Software
  • Mobile
  • Computing
  • Gaming
  • Videos
  • More
    • Gadget
    • Web Stories
    • Trending
    • Press Release
Have an existing account? Sign In
Follow US
  • Privacy
  • Terms
  • Advertise
  • Contact
Copyright © All Rights Reserved. World of Software.
World of Software > Computing > CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
Computing

CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog

News Room
Last updated: 2026/01/24 at 4:24 AM
News Room Published 24 January 2026
Share
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog
SHARE

Ravie LakshmananJan 24, 2026Vulnerability / Enterprise Security

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Friday added a critical security flaw affecting Broadcom VMware vCenter Server that was patched in June 2024 to its Known Exploited Vulnerabilities (KEV) catalog, citing evidence of active exploitation in the wild.

The vulnerability in question is CVE-2024-37079 (CVSS score: 9.8), which refers to a heap overflow in the implementation of the DCE/RPC protocol that could allow a bad actor with network access to vCenter Server to achieve remote code execution by sending a specially crafted network packet.

It was resolved by Broadcom in June 2024, along with CVE-2024-37080, another heap overflow in the implementation of the DCE/RPC protocol that could lead to remote code execution. Chinese cybersecurity company QiAnXin LegendSec researchers Hao Zheng and Zibo Li were credited with discovering and reporting the issues.

Cybersecurity

In a presentation at the Black Hat Asia security conference in April 2025, the researchers said the two flaws are part of a set of four vulnerabilities – three heap overflows and one privilege escalation – that were discovered in the DCE/RPC service. The two other flaws, CVE-2024-38812 and CVE-2024-38813, were patched by Broadcom in September 2024.

In particular, they found that one of the heap overflow vulnerabilities could be chained with the privilege escalation vulnerability (CVE-2024-38813) to achieve unauthorized remote root access and ultimately gain control over ESXi.

It’s currently not known how CVE-2024-37079 is being exploited, if it’s the work of any known threat actor or group, or the scale of such attacks. However, Broadcom has since updated its advisory to officially confirm in-the-wild abuse of the vulnerability.

“Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild,” the company said in its update.

In light of active exploitation, Federal Civilian Executive Branch (FCEB) agencies are required to update to the latest version by February 13, 2026, for optimal protection.

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Twitter Email Print
Share
What do you think?
Love0
Sad0
Happy0
Sleepy0
Angry0
Dead0
Wink0
Previous Article 2 Dead Giveaways Your Gas Pump Has A Card Skimmer – BGR 2 Dead Giveaways Your Gas Pump Has A Card Skimmer – BGR
Next Article Btcusa Price Drops as Whales Move BTC to Exchanges: What It Means Btcusa Price Drops as Whales Move BTC to Exchanges: What It Means
Leave a comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Stay Connected

248.1k Like
69.1k Follow
134k Pin
54.3k Follow

Latest News

Arzam Shehzad and Seara Consulting: Building Halal Marketing Agencies While Serving the Ummah
Arzam Shehzad and Seara Consulting: Building Halal Marketing Agencies While Serving the Ummah
Gadget
If you use Apple Cash, you will soon have to pay more just to get your money faster
If you use Apple Cash, you will soon have to pay more just to get your money faster
News
The Kuramoto Model: Synchronization and Dynamics of Coupled Oscillators | HackerNoon
The Kuramoto Model: Synchronization and Dynamics of Coupled Oscillators | HackerNoon
Computing
Kobo Clara Colour review: An affordable, perfect-sized e-reader that comes in color
Kobo Clara Colour review: An affordable, perfect-sized e-reader that comes in color
News

You Might also Like

The Kuramoto Model: Synchronization and Dynamics of Coupled Oscillators | HackerNoon
Computing

The Kuramoto Model: Synchronization and Dynamics of Coupled Oscillators | HackerNoon

3 Min Read
AMDGPU Driver Reverts Code For A Number Of Regressions On Linux 6.19
Computing

AMDGPU Driver Reverts Code For A Number Of Regressions On Linux 6.19

1 Min Read
Advanced Machine Learning: Bridging SDP Relaxation and Collective Motion Dynamics | HackerNoon
Computing

Advanced Machine Learning: Bridging SDP Relaxation and Collective Motion Dynamics | HackerNoon

2 Min Read
Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware
Computing

Multi-Stage Phishing Campaign Targets Russia with Amnesia RAT and Ransomware

9 Min Read
//

World of Software is your one-stop website for the latest tech news and updates, follow us now to get the news that matters to you.

Quick Link

  • Privacy Policy
  • Terms of use
  • Advertise
  • Contact

Topics

  • Computing
  • Software
  • Press Release
  • Trending

Sign Up for Our Newsletter

Subscribe to our newsletter to get our newest articles instantly!

World of SoftwareWorld of Software
Follow US
Copyright © All Rights Reserved. World of Software.
Welcome Back!

Sign in to your account

Lost your password?