CVE-2024-37080
Vulnerability from cvelistv5
Published
2024-06-18 05:43
Modified
2025-03-13 14:42
Severity ?
Summary
vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
Impacted products
Vendor Product Version
n/a VMware vCenter Server Version: 8.0   < 8.0 U2d
Version: 8.0   < 8.0 U1e
Version: 7.0   < 7.0 U3r
   n/a VMware Cloud Foundation Version: 5.x
Version: 4.x
Show details on NVD website


{
   containers: {
      adp: [
         {
            affected: [
               {
                  cpes: [
                     "cpe:2.3:a:vmware:cloud_foundation:4.0:-:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "cloud_foundation",
                  vendor: "vmware",
                  versions: [
                     {
                        lessThan: "6.0",
                        status: "affected",
                        version: "4.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:vmware:vcenter_server:8.0:*:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unaffected",
                  product: "vcenter_server",
                  vendor: "vmware",
                  versions: [
                     {
                        lessThan: "8.0u2d",
                        status: "affected",
                        version: "8.0",
                        versionType: "custom",
                     },
                     {
                        lessThan: "8.0u1e",
                        status: "affected",
                        version: "8.0",
                        versionType: "custom",
                     },
                  ],
               },
               {
                  cpes: [
                     "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
                  ],
                  defaultStatus: "unknown",
                  product: "vcenter_server",
                  vendor: "vmware",
                  versions: [
                     {
                        lessThan: "7.0u3r",
                        status: "affected",
                        version: "7.0",
                        versionType: "custom",
                     },
                  ],
               },
            ],
            metrics: [
               {
                  other: {
                     content: {
                        id: "CVE-2024-37080",
                        options: [
                           {
                              Exploitation: "poc",
                           },
                           {
                              Automatable: "yes",
                           },
                           {
                              "Technical Impact": "total",
                           },
                        ],
                        role: "CISA Coordinator",
                        timestamp: "2024-08-30T03:55:59.700292Z",
                        version: "2.0.3",
                     },
                     type: "ssvc",
                  },
               },
            ],
            problemTypes: [
               {
                  descriptions: [
                     {
                        cweId: "CWE-122",
                        description: "CWE-122 Heap-based Buffer Overflow",
                        lang: "en",
                        type: "CWE",
                     },
                  ],
               },
            ],
            providerMetadata: {
               dateUpdated: "2025-03-13T14:42:40.974Z",
               orgId: "134c704f-9b21-4f2e-91b3-4a467353bcc0",
               shortName: "CISA-ADP",
            },
            title: "CISA ADP Vulnrichment",
         },
         {
            providerMetadata: {
               dateUpdated: "2024-08-02T03:43:50.978Z",
               orgId: "af854a3a-2127-422b-91ae-364da2661108",
               shortName: "CVE",
            },
            references: [
               {
                  tags: [
                     "x_transferred",
                  ],
                  url: "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453",
               },
            ],
            title: "CVE Program Container",
         },
      ],
      cna: {
         affected: [
            {
               defaultStatus: "unaffected",
               product: "VMware vCenter Server",
               vendor: "n/a",
               versions: [
                  {
                     lessThan: "8.0 U2d",
                     status: "affected",
                     version: "8.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "8.0 U1e",
                     status: "affected",
                     version: "8.0",
                     versionType: "custom",
                  },
                  {
                     lessThan: "7.0 U3r",
                     status: "affected",
                     version: "7.0",
                     versionType: "custom",
                  },
               ],
            },
            {
               defaultStatus: "unaffected",
               product: "VMware Cloud Foundation",
               vendor: "n/a",
               versions: [
                  {
                     status: "affected",
                     version: "5.x",
                  },
                  {
                     status: "affected",
                     version: "4.x",
                  },
               ],
            },
         ],
         datePublic: "2024-06-17T16:30:00.000Z",
         descriptions: [
            {
               lang: "en",
               supportingMedia: [
                  {
                     base64: false,
                     type: "text/html",
                     value: "<span style=\"background-color: rgb(255, 255, 255);\">vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. </span>A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.<span style=\"background-color: rgb(255, 255, 255);\"><br></span><br>",
                  },
               ],
               value: "vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.",
            },
         ],
         metrics: [
            {
               cvssV3_1: {
                  attackComplexity: "LOW",
                  attackVector: "NETWORK",
                  availabilityImpact: "HIGH",
                  baseScore: 9.8,
                  baseSeverity: "CRITICAL",
                  confidentialityImpact: "HIGH",
                  integrityImpact: "HIGH",
                  privilegesRequired: "NONE",
                  scope: "UNCHANGED",
                  userInteraction: "NONE",
                  vectorString: "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
                  version: "3.1",
               },
               format: "CVSS",
               scenarios: [
                  {
                     lang: "en",
                     value: "GENERAL",
                  },
               ],
            },
         ],
         problemTypes: [
            {
               descriptions: [
                  {
                     description: "Heap-overflow vulnerability",
                     lang: "en",
                  },
               ],
            },
         ],
         providerMetadata: {
            dateUpdated: "2024-06-18T05:43:10.901Z",
            orgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d",
            shortName: "vmware",
         },
         references: [
            {
               url: "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453",
            },
         ],
         source: {
            discovery: "UNKNOWN",
         },
         x_generator: {
            engine: "Vulnogram 0.2.0",
         },
      },
   },
   cveMetadata: {
      assignerOrgId: "dcf2e128-44bd-42ed-91e8-88f912c1401d",
      assignerShortName: "vmware",
      cveId: "CVE-2024-37080",
      datePublished: "2024-06-18T05:43:10.901Z",
      dateReserved: "2024-06-03T05:40:17.631Z",
      dateUpdated: "2025-03-13T14:42:40.974Z",
      state: "PUBLISHED",
   },
   dataType: "CVE_RECORD",
   dataVersion: "5.1",
   "vulnerability-lookup:meta": {
      nvd: "{\"cve\":{\"id\":\"CVE-2024-37080\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2024-06-18T06:15:11.640\",\"lastModified\":\"2025-03-13T15:15:45.353\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.\"},{\"lang\":\"es\",\"value\":\"vCenter Server contiene una vulnerabilidad de desbordamiento de montón en la implementación del protocolo DCERPC. Un actor malintencionado con acceso a la red de vCenter Server puede desencadenar esta vulnerabilidad al enviar un paquete de red especialmente manipulado que podría conducir a la ejecución remota de código.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-122\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC974CA1-88D3-42E4-BF1F-28870F8171B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE63984-F69B-4593-9AEC-D179D6D98B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F3D992-9F48-4604-9AAF-DC2D1CE98BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C745A7E6-4760-48CD-B7C4-1C2C20217F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5522514-8ED9-45DB-9036-33FE40D77E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C27C660-E917-4944-8B4C-41D9622B76D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CFB469-B3E6-4503-A47C-D18206D4D19A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"67024A43-9E13-4F4E-B711-731792DA3840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"604F559F-1775-4F29-996E-9079B99345B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DC9400-5AEE-49AC-9925-0A96E32BD8C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC8BEF1-7908-46C0-841A-834778D1A863\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA81CCD-A05E-498C-820E-21980E92132F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE83406-A3D9-4F75-A1A6-63831CEBEEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB563627-C9CF-4D8A-B882-9AB65EAE9E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA03B2A-48B2-48AD-B8EB-9D7BB2016819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2392D0F-D7A2-4E01-9212-1BA6C895AEBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D731C1A-9FE5-461C-97E2-6F45E4CBABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"8725E544-2A94-4829-A683-1ECCE57A74A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC6765A-6584-45A8-9B21-4951D2EA8939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DD238C-EF73-44F0-928E-A94FF5C4B378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CA36C1-732E-41AE-B847-F7411B753F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA882B6-D811-4E4B-B614-2D48F0B9036E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D30A78E-16D0-4A2E-A2F8-F6073698243E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"188E103E-9568-4CE0-A984-141B2A9E82D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*\",\"matchCriteriaId\":\"B266439F-E911-4C95-9D27-88DF96DDCCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6508A908-EF14-4A72-AC75-5DA6F8B98A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"58597F18-0B23-4D21-9ABA-D9773958F10E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF46C54-313B-4742-A074-EEA0A6554680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*\",\"matchCriteriaId\":\"9587F800-57BC-44B6-870E-95691684FC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD148A75-5076-416D-AFD6-0F281DA0A82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*\",\"matchCriteriaId\":\"956CEA8C-F8C4-41BD-85B4-44FE3A772E50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*\",\"matchCriteriaId\":\"008AEA0F-116B-4AF8-B3A7-3041CCE25235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE486B2F-AED4-4FCE-A674-DFC25844FEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*\",\"matchCriteriaId\":\"455DD46E-A071-476D-8914-767485E45F35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A422D04-48DF-4A16-94F8-D5702CC2782D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*\",\"matchCriteriaId\":\"806E9219-CDF4-4E62-978E-334E96A94BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D8B182-4E71-4655-8DD8-743A3EF6DC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*\",\"matchCriteriaId\":\"A814F0AB-4AEB-4139-976F-425A4A9EC67B\"}]}]},{\"operator\":\"AND\",\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA81CCD-A05E-498C-820E-21980E92132F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE83406-A3D9-4F75-A1A6-63831CEBEEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB563627-C9CF-4D8A-B882-9AB65EAE9E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA03B2A-48B2-48AD-B8EB-9D7BB2016819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2392D0F-D7A2-4E01-9212-1BA6C895AEBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D731C1A-9FE5-461C-97E2-6F45E4CBABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"8725E544-2A94-4829-A683-1ECCE57A74A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC6765A-6584-45A8-9B21-4951D2EA8939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DD238C-EF73-44F0-928E-A94FF5C4B378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CA36C1-732E-41AE-B847-F7411B753F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA882B6-D811-4E4B-B614-2D48F0B9036E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D30A78E-16D0-4A2E-A2F8-F6073698243E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"188E103E-9568-4CE0-A984-141B2A9E82D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*\",\"matchCriteriaId\":\"B266439F-E911-4C95-9D27-88DF96DDCCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6508A908-EF14-4A72-AC75-5DA6F8B98A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"58597F18-0B23-4D21-9ABA-D9773958F10E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF46C54-313B-4742-A074-EEA0A6554680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*\",\"matchCriteriaId\":\"9587F800-57BC-44B6-870E-95691684FC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD148A75-5076-416D-AFD6-0F281DA0A82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*\",\"matchCriteriaId\":\"956CEA8C-F8C4-41BD-85B4-44FE3A772E50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*\",\"matchCriteriaId\":\"008AEA0F-116B-4AF8-B3A7-3041CCE25235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE486B2F-AED4-4FCE-A674-DFC25844FEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*\",\"matchCriteriaId\":\"455DD46E-A071-476D-8914-767485E45F35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A422D04-48DF-4A16-94F8-D5702CC2782D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*\",\"matchCriteriaId\":\"806E9219-CDF4-4E62-978E-334E96A94BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D8B182-4E71-4655-8DD8-743A3EF6DC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*\",\"matchCriteriaId\":\"A814F0AB-4AEB-4139-976F-425A4A9EC67B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC974CA1-88D3-42E4-BF1F-28870F8171B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE63984-F69B-4593-9AEC-D179D6D98B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F3D992-9F48-4604-9AAF-DC2D1CE98BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C745A7E6-4760-48CD-B7C4-1C2C20217F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5522514-8ED9-45DB-9036-33FE40D77E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C27C660-E917-4944-8B4C-41D9622B76D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CFB469-B3E6-4503-A47C-D18206D4D19A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"67024A43-9E13-4F4E-B711-731792DA3840\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"604F559F-1775-4F29-996E-9079B99345B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"61DC9400-5AEE-49AC-9925-0A96E32BD8C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"8EC8BEF1-7908-46C0-841A-834778D1A863\"}]},{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":false,\"criteria\":\"cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndExcluding\":\"5.2\",\"matchCriteriaId\":\"7FA8DFE6-9C74-4711-A8AF-3B170876A1F9\"}]}]}],\"references\":[{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453\",\"source\":\"security@vmware.com\",\"tags\":[\"Patch\",\"Vendor Advisory\"]},{\"url\":\"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Vendor Advisory\"]}]}}",
      vulnrichment: {
         containers: "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453\", \"tags\": [\"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-02T03:43:50.978Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2024-37080\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"poc\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-08-30T03:55:59.700292Z\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:vmware:cloud_foundation:4.0:-:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"cloud_foundation\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\", \"lessThan\": \"6.0\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:vmware:vcenter_server:8.0:*:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"vcenter_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.0u2d\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.0u1e\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"cpes\": [\"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"vcenter_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"7.0u3r\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-122\", \"description\": \"CWE-122 Heap-based Buffer Overflow\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-06-18T14:22:28.089Z\"}}], \"cna\": {\"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"n/a\", \"product\": \"VMware vCenter Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.0 U2d\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.0 U1e\", \"versionType\": \"custom\"}, {\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"7.0 U3r\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"n/a\", \"product\": \"VMware Cloud Foundation\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x\"}, {\"status\": \"affected\", \"version\": \"4.x\"}], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2024-06-17T16:30:00.000Z\", \"references\": [{\"url\": \"https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24453\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.2.0\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"<span style=\\\"background-color: rgb(255, 255, 255);\\\">vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. </span>A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.<span style=\\\"background-color: rgb(255, 255, 255);\\\"><br></span><br>\", \"base64\": false}]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"description\": \"Heap-overflow vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2024-06-18T05:43:10.901Z\"}}}",
         cveMetadata: "{\"cveId\": \"CVE-2024-37080\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-03-13T14:42:40.974Z\", \"dateReserved\": \"2024-06-03T05:40:17.631Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2024-06-18T05:43:10.901Z\", \"assignerShortName\": \"vmware\"}",
         dataType: "CVE_RECORD",
         dataVersion: "5.1",
      },
   },
}


Log in or create an account to share your comment.

Security Advisory comment format.

This schema specifies the format of a comment related to a security advisory.

UUIDv4 of the comment
UUIDv4 of the Vulnerability-Lookup instance
When the comment was created originally
When the comment was last updated
Title of the comment
Description of the comment
The identifier of the vulnerability (CVE ID, GHSA-ID, PYSEC ID, etc.).



Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.