CISA says critical VMware RCE flaw now actively exploited
嗯,用户让我用中文总结一篇文章,控制在100字以内,而且不需要特定的开头。首先,我得通读一下这篇文章,了解主要内容。 文章讲的是美国网络安全和基础设施安全局(CISA)警告了一个VMware vCenter Server的严重漏洞CVE-2024-37079,这个漏洞已经被积极利用了。CISA要求联邦机构在三周内修复他们的服务器。这个漏洞是由于DCERPC协议中的堆溢出问题导致的,攻击者可以通过发送特制的网络包来执行远程代码,而且不需要权限或用户交互。补丁已经在6月发布,但没有其他缓解措施,所以建议尽快升级。 接下来,我需要提取关键信息:CISA警告、VMware漏洞、远程代码执行、三周修复期限、补丁可用。然后把这些信息浓缩成100字以内的中文句子。 要注意不要使用“文章内容总结”这样的开头,直接描述内容。可能的结构是:CISA警告VMware漏洞被利用,要求修复,漏洞细节和影响。 最后检查字数是否符合要求,并确保信息准确无误。 </think> 美国网络安全机构CISA警告VMware vCenter Server存在严重漏洞CVE-2024-37079,该漏洞可被攻击者利用执行远程代码。CISA要求联邦机构在三周内修复系统,并强调此漏洞风险极高。 2026-1-26 12:0:25 Author: www.bleepingcomputer.com(查看原文) 阅读量:0 收藏

VMware

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has flagged a critical VMware vCenter Server vulnerability as actively exploited and ordered federal agencies to secure their servers within three weeks.

Patched in June 2024, this security flaw (CVE-2024-37079) stems from a heap overflow weakness in the DCERPC protocol implementation of vCenter Server (a Broadcom VMware vSphere management platform that helps admins manage ESXi hosts and virtual machines).

Threat actors with network access to vCenter Server may exploit this vulnerability by sending a specially crafted network packet that can trigger remote code execution in low-complexity attacks that don't require privileges on the targeted systems or user interaction.

Wiz

There are no workarounds or mitigations for CVE-2024-37079, so Broadcom advised customers to apply security patches to the latest vCenter Server and Cloud Foundation releases as soon as possible.

On Friday, CISA added the vulnerability to its catalog of flaws exploited in the wild, giving Federal Civilian Executive Branch (FCEB) agencies three weeks to secure vulnerable systems by February 13th, as mandated by the Binding Operational Directive (BOD) 22-01 issued in November 2021.

FCEB agencies are non-military U.S. executive branch agencies, such as the Department of State, the Department of Justice, the Department of Energy, and the Department of Homeland Security.

"This type of vulnerability is a frequent attack vector for malicious cyber actors and poses significant risks to the federal enterprise," CISA warned. "Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable."

The same day, Broadcom updated its original advisory and confirmed that it's also aware that CVE-2024-37079 has been exploited in the wild.

"Broadcom has information to suggest that exploitation of CVE-2024-37079 has occurred in the wild," it cautioned.

In October, CISA also ordered U.S. government agencies to patch a high-severity vulnerability (CVE-2025-41244) in Broadcom's VMware Aria Operations and VMware Tools software, which Chinese hackers had been exploiting in zero-day attacks since October 2024.

Last year, Broadcom also released security patches to address two high-severity VMware NSX flaws (CVE-2025-41251 and CVE-2025-41252) reported by the U.S. National Security Agency (NSA) and fixed three other actively exploited VMware zero-days (CVE-2025-22224, CVE-2025-22225, and CVE-2025-22226) reported by Microsoft.

Wiz

Secrets Security Cheat Sheet: From Sprawl to Control

Whether you're cleaning up old keys or setting guardrails for AI-generated code, this guide helps your team build securely from the start.

Get the cheat sheet and take the guesswork out of secrets management.


文章来源: https://www.bleepingcomputer.com/news/security/cisa-says-critical-vmware-rce-flaw-now-actively-exploited/
如有侵权请联系:admin#unsafe.sh