Red Hot Cyber
Cybersecurity is about sharing. Recognize the risk, combat it, share your experiences, and encourage others to do better than you.
Cybersecurity is about sharing. Recognize the risk,
combat it, share your experiences, and encourage others
to do better than you.
UtiliaCS 320x100
LECS 970x120 1
CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

CISA alert: Exploit underway against VMware vCenter. Risk of RCE without authentication.

25 January 2026 21:33

The critical vulnerability recently added to the Cybersecurity and Infrastructure Security Agency (CISA) catalog of known exploited vulnerabilities (KEVs) affects the Broadcom VMware vCenter Server and is being actively exploited by malicious hackers to breach corporate networks, the agency confirmed.

For a skilled adversary, the attack vector appears alarmingly simple. According to the CVE filing, a specially crafted network packet can be sent by an attacker with network access to vCenter Server, thus triggering this vulnerability.

The vulnerability is CVE-2024-37079, which has a critical CVSS score of 9.8, signaling the highest threat level for organizations using unpatched versions of the popular virtualization management platform.

The flaw is hidden in the implementation of the DCERPC protocol used by vCenter Server. It is described as a heap overflow vulnerability.

The issue was originally fixed by Broadcom in June 2024, along with a similar heap overflow vulnerability, identified as CVE-2024-37080. Both issues were attributed to security researchers Hao Zheng and Zibo Li of the Chinese cybersecurity firm QiAnXin LegendSec.

If the attack is successful, this single packet can trigger remote code execution (RCE), effectively handing the server keys to the attacker without the need for a password or prior authentication.

While the details of the attacks remain unclear, the realization that they are being actively exploited is changing defense strategies. CISA’s decision to include this vulnerability in the KEV catalog requires urgent action for federal networks.

However, despite patches being available for over a year, Broadcom has now updated its advisory to officially confirm the ongoing abuse of the vulnerability.

The agency stated that “substantial risks exist to the federal agency” and therefore directed all federal civil executive branch (FCEB) agencies to address the vulnerability by February 13, 2026.

Follow us on Google News to receive daily updates on cybersecurity. Contact us if you would like to report news, insights or content for publication.

Cropped RHC 3d Transp2 1766828557 300x300
The Red Hot Cyber Editorial Team provides daily updates on bugs, data breaches, and global threats. Every piece of content is validated by our community of experts, including Pietro Melillo, Massimiliano Brolli, Sandro Sana, Olivia Terragni, and Stefano Gazzella. Through synergy with our industry-leading partners—such as Accenture, CrowdStrike, Trend Micro, and Fortinet—we transform technical complexity into collective awareness. We ensure information accuracy by analyzing primary sources and maintaining a rigorous technical peer-review process.