CISA Flags Actively Exploited VMware vCenter RCE in KEV Catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has added a critical Broadcom VMware vCenter Server vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, citing confirmed exploitation in the wild.
Key Details
- CVE: CVE-2024-37079
- Severity: CVSS 9.8 (Critical)
- Impact: Unauthenticated remote code execution (RCE)
- Component: vCenter Server DCE/RPC implementation
- Patch Released: June 2024
- KEV Added: January 2026
- Deadline for FCEB Agencies: February 13, 2026
What’s the Issue?
CVE-2024-37079 is a heap overflow vulnerability in the DCE/RPC protocol handling within VMware vCenter Server. An attacker with network access can send a specially crafted packet to trigger memory corruption and execute arbitrary code on the target system.
Broadcom has now officially confirmed in-the-wild exploitation:
“Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.”
Offensive Security, Bug Bounty Courses
Part of a Larger Exploit Chain
Security researchers Hao Zheng and Zibo Li (QiAnXin LegendSec) revealed at Black Hat Asia 2025 that this flaw is part of a broader set of DCE/RPC vulnerabilities:
- CVE-2024-37079 – Heap overflow (RCE) ✅ actively exploited
- CVE-2024-37080 – Heap overflow (RCE)
- CVE-2024-38812 – Heap overflow
- CVE-2024-38813 – Privilege escalation
Notably, the researchers demonstrated that heap overflows can be chained with CVE-2024-38813 to achieve remote root access and full ESXi takeover, making this class of bugs especially dangerous in virtualized environments.
What’s Unknown
- The identity of the threat actor(s)
- The exploitation vector used in real-world attacks
- The scale and targeting of ongoing campaigns
Trending: Offensive Security Tool: APKScope
Required Action
- Immediate patching is strongly recommended
- Organizations running VMware vCenter Server should verify they are on a fully patched version
- FCEB agencies must remediate by February 13, 2026, per KEV requirements
Why This Matters
vCenter is a high-value target—compromise can lead to:
- Full control of virtualization infrastructure
- ESXi host takeover
- Lateral movement across critical workloads
This KEV addition signals real, ongoing risk, not theoretical exposure.
Are u a security researcher? Or a company that writes articles about Cyber Security, Offensive Security (related to information security in general) that match with our specific audience and is worth sharing? If you want to express your idea in an article contact us here for a quote: [email protected]
Sources: thehackernews.com, cisa.gov/news-events/alerts/2026/01/23/cisa-adds-one-known-exploited-vulnerability-catalog












