top of page

Critical vCenter Server RCE Vulnerability (CVE-2024-37079) Actively Exploited in the Wild

January 27th, 2026

Critical

Our Cyber Threat Intelligence Unit is monitoring updated vendor guidance on CVE-2024-37079, a critical remote code execution (RCE) vulnerability in VMware vCenter Server. Although first disclosed in June 2024, the issue has become more urgent following Broadcom’s January 23, 2026, advisory confirming active exploitation. The vulnerability affects vCenter Server’s DCERPC protocol implementation and has a CVSS v3.1 score of 9.8 (Critical). Attackers with network access to a vulnerable vCenter service can exploit this vulnerability to execute arbitrary code and potentially gain full control of the virtualization management plane. Given vCenter’s central, highly privileged role, unpatched deployments pose a high-impact operational and security risk. 

Technical Details

  • CVE ID: CVE-2024-37079

  • Severity: Critical (CVSS v3.1 Score: 9.8)

  • Vulnerability Type: Heap Overflow

  • Affected Products:

    • VMware vCenter Server

    • VMware Cloud Foundation (deployments including vCenter Server)

  • Protocol Involved: DCERPC

  • Attack Vector: Network-based exploitation

  • Exploitation Mechanics:

    • The vulnerability is caused by a heap-overflow condition in vCenter Server’s DCERPC protocol handling.

    • A remote attacker with network access to the vulnerable service can send specially crafted DCERPC packets.

    • Malformed requests may trigger memory corruption within the vCenter Server process.

    • Successful exploitation can result in arbitrary code execution with elevated privileges.

    • Exploitation occurs without authentication or prior access, significantly increasing exposure where management services are broadly reachable.

Image by ThisisEngineering

Impact

  • Successful exploitation may allow remote code execution on the vCenter Server.

  • A compromised vCenter instance enables full administrative control over virtualized environments, including:

    • Creation, modification, or deletion of virtual machines

    • Disruption of workloads and services

  • Attackers may leverage vCenter access for lateral movement to managed hosts and connected infrastructure.

  • Due to vCenter’s privileged position, exploitation poses severe risks to availability, integrity, and operational stability across enterprise environments.

Detection Method

Organizations should take the following steps to identify potential exposure or exploitation:

  • Identify deployed vCenter Server versions and validate patch status against Broadcom’s updated advisory.

  • Monitor network traffic for unusual or malformed DCERPC requests targeting vCenter services.

  • Review system and application logs for unexpected crashes, memory errors, or abnormal vCenter behavior.

  • Use vulnerability scanners and asset management tools that reference CVE-2024-37079.

  • Investigate unexplained vCenter service restarts or performance anomalies.

Indicators of Compromise

There are no Indicators of Compromise (IOCs) for this advisory.

mix of red, purple, orange, blue bubble shape waves horizontal for cybersecurity and netwo

Recommendations

  • Apply vendor patches immediately for CVE-2024-37079.

    • Upgrade to a fixed vCenter Server release, including:

      • vCenter Server 8.0 U2d or 8.0 U1e

      • vCenter Server 7.0 U3r

  • Restrict network access to vCenter Server, allowing connections only from trusted management networks.

  • Ensure management services are not exposed to untrusted or external network segments.

  • Review Broadcom security advisories regularly for updates and remediation guidance.

  • Increase logging, monitoring, and alerting for DCERPC activity and vCenter service anomalies.

Conclusion

CVE-2024-37079 remains a critical and actively relevant threat to VMware vCenter Server, particularly following confirmation of in-the-wild exploitation in recent vendor guidance. The vulnerability’s ability to facilitate unauthenticated remote code execution highlights the importance of strict access controls, continuous monitoring, and timely patching. Organizations operating unpatched vCenter environments face elevated operational and security risk due to vCenter’s central role in infrastructure management. Immediate remediation and sustained defensive monitoring are essential to reduce exposure and protect virtualized environments.

bottom of page