vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
Project Subscriptions
Advisories
No advisories yet.
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 13 Mar 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Weaknesses | CWE-122 | |
| CPEs | cpe:2.3:a:vmware:cloud_foundation:4.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:*:*:*:*:*:*:* |
|
| Metrics |
ssvc
|
Fri, 30 Aug 2024 17:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Vmware
Vmware cloud Foundation Vmware vcenter Server |
|
| Weaknesses | CWE-787 | |
| CPEs | cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:* cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:* |
|
| Vendors & Products |
Vmware
Vmware cloud Foundation Vmware vcenter Server |
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: vmware
Published:
Updated: 2026-01-24T04:55:13.644Z
Reserved: 2024-06-03T05:40:17.631Z
Link: CVE-2024-37080
Updated: 2024-08-02T03:43:50.978Z
Status : Modified
Published: 2024-06-18T06:15:11.640
Modified: 2025-03-13T15:15:45.353
Link: CVE-2024-37080
No data.
OpenCVE Enrichment
No data.