The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
https://www.theregister.com/2025/02/28/cisa_kev_list_ransomware/
https://isc.sans.edu/diary/rss/31510
https://thehackernews.com/2024/11/cisa-alert-active-exploitation-of.html
https://www.theregister.com/2024/11/18/vmware_vcenter_rce_exploited/
https://securityaffairs.com/171147/security/vmware-vcenter-server-bugs-actively-exploited.html
Published: 2024-09-17
Updated: 2024-10-02
Known Exploited Vulnerability (KEV)
Base Score: 10
Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C
Severity: Critical
Base Score: 9.8
Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Severity: Critical
EPSS: 0.5801
Tenable Research has classified this CVE under the following Vulnerability Watch classification, which includes active and historical (inactive) classifications. You can learn more about these classifications on our blog.
Vulnerability Being Monitored