CVE-2024-37079

9.8 CRITICAL

📋 TL;DR

CVE-2024-37079 is a critical heap overflow vulnerability in vCenter Server's DCERPC protocol implementation that allows remote code execution. Attackers with network access can exploit it by sending specially crafted packets. All organizations running vulnerable vCenter Server versions are affected.

💻 Affected Systems

Products:
  • VMware vCenter Server
Versions: Multiple versions - check VMware advisory for specific affected versions
Operating Systems: Windows, Linux (vCenter Server Appliance)
Default Config Vulnerable: ⚠️ Yes
Notes: All standard deployments are vulnerable. No special configuration required for exploitation.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete compromise of vCenter Server leading to full control over virtual infrastructure, data exfiltration, ransomware deployment, and lateral movement to connected systems.

🟠

Likely Case

Remote code execution with SYSTEM/root privileges on vCenter Server, enabling persistence, credential theft, and disruption of virtual infrastructure.

🟢

If Mitigated

Limited impact due to network segmentation and strict access controls preventing exploitation attempts from reaching vCenter Server.

🌐 Internet-Facing: HIGH
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: CONFIRMED
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

CISA has added this to its Known Exploited Vulnerabilities catalog, confirming active exploitation in the wild.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check VMware Security Advisory VMSA-2024-0016 for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453

Restart Required: Yes

Instructions:

1. Download the appropriate patch from VMware's download portal. 2. Backup vCenter Server and associated databases. 3. Apply the patch following VMware's documented procedures. 4. Restart vCenter Server services as required.

🔧 Temporary Workarounds

Network Segmentation

all

Isolate vCenter Server from untrusted networks and restrict access to management interfaces

Firewall Rules

all

Block DCERPC protocol traffic (port 135 and related ports) from untrusted sources

🧯 If You Can't Patch

  • Implement strict network segmentation to isolate vCenter Server from all but essential management systems
  • Deploy intrusion detection/prevention systems to monitor for exploitation attempts and block malicious DCERPC traffic

🔍 How to Verify

Check if Vulnerable:

Check vCenter Server version against VMware's advisory. Vulnerable if running affected versions.

Check Version:

On vCenter Server Appliance: cat /etc/vmware-release or check via vSphere Client under Help > About

Verify Fix Applied:

Verify vCenter Server version matches or exceeds patched versions listed in VMware advisory VMSA-2024-0016

📡 Detection & Monitoring

Log Indicators:

  • Unusual DCERPC protocol activity
  • Multiple failed connection attempts to vCenter Server
  • Process creation anomalies on vCenter Server

Network Indicators:

  • Malformed DCERPC packets to vCenter Server
  • Unusual traffic patterns to port 135 or vCenter management ports

SIEM Query:

source="vcenter" AND (event_type="security_alert" OR protocol="DCERPC") AND severity="critical"

🔗 References

📤 Share & Export