VMware vCenter, in the spotlight: Broadcom confirms “in-the-wild” exploitation of a critical flaw (VMSA-2024-0012.1)

Broadcom (VMware) has updated its security advisory VMSA-2024-0012.1 with a particularly important note for infrastructure teams: signs of active exploitation in the wild of CVE-2024-37079, one of the critical vulnerabilities affecting VMware vCenter Server. The advisory update is dated January 23, 2026, leaving no doubt: patching is no longer a recommendation, it’s an operational priority.

The advisory groups three CVEs: two heap-overflow vulnerabilities in the DCERPC protocol (associated with possible remote code execution) and a local privilege escalation vulnerability resulting from a misconfiguration of sudo.


What has been officially published

From a technical and impact perspective, the advisory covers:

  • CVE-2024-37079 and CVE-2024-37080 (Critical, CVSS 9.8):
    Heap-overflow vulnerabilities in DCERPC. An attacker with network access could trigger them through specially crafted packets, risking RCE (according to the manufacturer’s own assessment).
  • CVE-2024-37081 (Important/Critical in the advisory, CVSS 7.8):
    Local privilege escalation: an authenticated local user without administrative privileges could elevate to root on the vCenter Server Appliance.

Additionally, the update from January 23, 2026, adds a line that shifts the risk context: “Broadcom has information suggesting that exploitation of CVE-2024-37079 has occurred in the wild.”

As an additional sign of operational criticality, the NVD entry shows that CVE-2024-37079 was added to the CISA KEV catalog on January 23, 2026, with remediation deadline set by CISA.


Table 1 — Executive Summary (the essentials)

ElementDetail
AdvisoryVMSA-2024-0012.1 (updated 01/23/2026)
Affected productsVMware vCenter Server; VMware Cloud Foundation
CVEsCVE-2024-37079, CVE-2024-37080, CVE-2024-37081
Main impactRemote Code Execution (RCE) in DCERPC + local privilege escalation
SeverityCritical (up to CVSS 9.8); 7.8 for LPE
Active exploitationIndicated for CVE-2024-37079 as “in the wild”
WorkaroundFor RCE (37079/37080), indicated as not feasible; for 37081, no workaround available

Table 2 — Corrected versions (manufacturer response matrix)

PlatformLineCovered CVEsSuggested fix
vCenter Server8.037079/37080/37081vCenter 8.0 U2d
vCenter Server8.037079/37080vCenter 8.0 U1e
vCenter Server7.037079/37080/37081vCenter 7.0 U3r
Cloud Foundation (vCenter)5.x / 4.x37079/37080/37081KB88287

Why is vCenter particularly vulnerable?

vCenter is typically the control plane in virtualization: inventory, permissions, provisioning, virtual networks, storage, and operations. This makes even when a “only” component is affected, the potential impact is disproportionately high compared to other services: a failure or takeover could lead to loss of operational control, service disruptions, and lateral movement.

The key factors recognized in the advisory include:

  • Network vector (for the critical DCERPC CVEs)
  • Critical severity (9.8)
  • Signs of actual exploitation (at least for CVE-2024-37079)

Recommended actions for system teams (priority order)

  1. Immediate inventory
    • Locate all vCenter and Cloud Foundation environments (including DR/BCP and connected labs).
  2. Prioritize based on exposure
    • Isolate any unnecessary network routes to vCenter (segmenting, ACLs, bastion hosts, VPNs, controlled hops). Although the advisory mentions “network access,” the safest practice is treating vCenter as a management network-only service.
  3. Apply the correct patch
    • vCenter 8.0 → U2d (or U1e if applicable to your branch/case)
    • vCenter 7.0 → U3r
    • Cloud Foundation 4.x/5.x → KB88287
  4. Post-update verification
    • Confirm version and service status, and review integrity/operational logs.
    • Maintain heightened monitoring after patching (attack windows often intensify after wide dissemination).
  5. Reduce operational risk
    • Review privileged access to VCSA, enable MFA where applicable, and harden the management plane.
    • Align with internal vulnerability management procedures (critical SLA).
Scroll to Top