U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog
好的,我现在需要帮用户总结这篇文章的内容,控制在100字以内。首先,我得仔细阅读文章,找出关键信息。 文章主要讲的是美国网络安全和基础设施安全局(CISA)将Broadcom VMware vCenter Server的一个漏洞加入到已知被利用的漏洞目录中。这个漏洞的编号是CVE-2024-37079,CVSS评分为9.8,属于严重级别。 接下来,文章提到这个漏洞是在DCERPC协议的实现中发现的堆溢出问题。攻击者可以通过精心构造的网络包触发这些漏洞,从而实现远程代码执行或权限提升。VMware已经在2024年6月发布了安全补丁来修复这个问题。 此外,漏洞是由Legendsec天工实验室的研究人员发现的,并且Broadcom确认有针对CVE-2024-37079的实际攻击发生。CISA要求联邦机构在2026年2月13日前修复此漏洞。 总结起来,我需要将这些关键点浓缩到100字以内。注意不要使用“文章内容总结”这样的开头,直接描述即可。 现在组织语言:CISA将Broadcom VMware vCenter Server的一个高危堆溢出漏洞加入已知被利用目录。该漏洞编号为CVE-2024-37079,CVSS 9.8分,可被远程利用导致代码执行或权限提升。VMware已发布补丁修复,CISA要求联邦机构于2026年2月前完成修复。 </think> 美国网络安全机构CISA将Broadcom VMware vCenter Server的一个高危堆溢出漏洞(CVE-2024-37079)加入已知被利用目录。该漏洞CVSS评分9.8分,可被远程利用导致代码执行或权限提升。VMware已发布补丁修复,CISA要求联邦机构于2026年2月前完成修复。 2026-1-24 10:23:57 Author: securityaffairs.com(查看原文) 阅读量:2 收藏

U.S. CISA adds a flaw in Broadcom VMware vCenter Server to its Known Exploited Vulnerabilities catalog

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds a flaw impacting Broadcom VMware vCenter to its Known Exploited Vulnerabilities catalog.

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added a Broadcom VMware vCenter Server vulnerability, tracked as CVE-2024-37079 (CVSS score of 9.8), to its Known Exploited Vulnerabilities (KEV) catalog.

vCenter Server is a centralized management platform developed by VMware for managing virtualized environments.

In June 2024, VMware addressed vCenter Server vulnerabilities, tracked as CVE-2024-37079 and CVE-2024-37080, that remote attackers can exploit to achieve remote code execution or privilege escalation.

The flaws are heap-overflow issues in the implementation of the DCERPC protocol. An attacker with network access can exploit them via crafted packets, potentially achieving remote code execution.

“The vCenter Server contains multiple heap-overflow vulnerabilities in the implementation of the DCERPC protocol. VMware has evaluated the severity of these issues to be in the Critical severity range with a maximum CVSSv3 base score of 9.8.” reads the  advisory. “A malicious actor with network access to vCenter Server may trigger these vulnerabilities by sending a specially crafted network packet potentially leading to remote code execution.”

Customers are recommended to install the released security patches, no workarounds are available.

The vulnerabilities were reported by Hao Zheng (@zhz) and Zibo Li (@zbleet) from TianGong Team of Legendsec at Qi’anxin Group.

In an advisory update, Broadcom confirmed it is aware of attacks targeting CVE-2024-37079, however, exploitation details remain undisclosed.

“Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild.” continues the advisory.

Researchers revealed at Black Hat Asia 2025 that CVE-2024-37079 is part of four DCE/RPC flaws, three heap overflows and one privilege escalation. Two related bugs were patched in September 2024. One heap overflow can be chained with CVE-2024-38813 to gain remote root access on ESXi.

“Notably, we were able to exploit one of the heap overflow vulnerabilities in combination with the privilege escalation vulnerability to achieve unauthorized remote root access, successfully completing the Matrix Cup 2024 vulnerability challenge.” wrote the researchers. “In this presentation, we will begin by providing a detailed overview of the DCERPC protocol and the four vulnerabilities we uncovered in its implementation within vCenter Server, which have been assigned CVE numbers CVE-2024-37079, CVE-2024-37080, CVE-2024-38812, and CVE-2024-38813. “

According to Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.

Experts also recommend that private organizations review the Catalog and address the vulnerabilities in their infrastructure.

CISA orders federal agencies to fix the vulnerability by February 13, 2026.

Pierluigi Paganini

Follow me on Twitter: @securityaffairs and Facebook and Mastodon

(SecurityAffairs – hacking, US CISA Known Exploited Vulnerabilities catalog)




文章来源: https://securityaffairs.com/187267/security/u-s-cisa-adds-a-flaw-in-broadcom-vmware-vcenter-server-to-its-known-exploited-vulnerabilities-catalog.html
如有侵权请联系:admin#unsafe.sh