CVE-2024-37079
Published Jun 18, 2024
Last updated 14 days ago
AI description
CVE-2024-37079 is a heap-overflow vulnerability found within the DCERPC protocol implementation of VMware vCenter Server. This flaw allows a malicious actor with network access to the vCenter Server to send specially crafted network packets. Successful exploitation of this vulnerability can lead to remote code execution on the affected server. This vulnerability has been observed to be actively exploited in the wild.
- Description
- vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
- Source
- security@vmware.com
- NVD status
- Analyzed
- Products
- cloud_foundation, vcenter_server
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
- Exploit added on
- Jan 23, 2026
- Exploit action due
- Feb 13, 2026
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
VMware by Broadcom has confirmed in-the-wild exploitation of CVE-2024-37079 in VMware vCenter Server, and CISA has flagged it as actively exploited with a hard remediation deadline for U.S. federal agencies of February 13, 2026. That combination (vendor confirmation + KEV-style
@TheTechWorldPod
5 Feb 2026
99 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 vCenter Server CVE-2024-37079: ITW DCERPC heap-o/f → net RCE. Exposed: reachable vCenter 7/8 + VCF. Patch: 8.0U2d/8.0U1e/7.0U3r (VCF KB88287). If not patched now: firewall vCenter to admin IPs only. https://t.co/rdjAPQEEy8
@phaneragnosis
4 Feb 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA KEV 警告 26/01/23:VMware:vCenter の脆弱性 CVE-2024-37079 を登録 https://t.co/D6LX4mU3YQ 仮想化環境の管理を担う VMware vCenter Server
@iototsecnews
2 Feb 2026
129 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ثغرة أمنية (CVE-2024-37079، بتقييم CVSS عند 9.8) في خادم @VMware vCenter تتيح اختراق النظام عن بعد، أدرجتها @CISAgov بقائمة الثغرات المستغلة فعلياً. يحدث الخلل في معالجة بيانا
@HumamJanda70980
1 Feb 2026
67 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
ALERT: VMware vCenter RCE exploit (CVE-2024-37079) actively weaponized by threat actors. SOVEREIGN PROTOCOL: Immediate network segmentation of virtualization infrastructure, deploy dedicated management VLANs, implement zero-trust access controls. #TheSovereignProtocol
@sovereignexec
30 Jan 2026
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA confirms active exploitation of critical VMware vCenter RCE flaw CVE-2024-37079. Threat actors achieve remote code execution via crafted network packets. Sovereign Protocol: Immediately audit all virtualization infrastructure, implement network segmentation, deploy endpoint
@sovereignexec
29 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Broadcom flags actively exploited VMware vCenter flaw (CVE-2024-37079) impacting virtualization security UpGuard notes Broadcom reported an incident tied to active exploitation of a critical out-of-bounds write in VMware vCenter Server (CVE-2024-37079) that could enable
@ThreatSynop
28 Jan 2026
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA orders patching of VMware vCenter critical RCE flaw (CVE-2024-37079) after June DCERPC heap-overflow fix. 1Password adds phishing alerts as AI phishing rises. Microsoft fixes Windows 11 boot issues with KB5074109. #VMware #US #PhishingProtection https://t.co/VoJos4kNw6
@TweetThreatNews
28 Jan 2026
320 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware vCenter Serverの1年前の脆弱性(CVE-2024-37079)がKEVに追加 https://t.co/9gjsFrXPMo #セキュリティ対策Lab #セキュリティ #Security #サイバー攻撃 #CybersecurityNews
@securityLab_jp
28 Jan 2026
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds CVE-2024-37079, a critical heap-overflow RCE in VMware vCenter Server, to its KEV catalog after confirming active exploitation. The flaw enables unauthenticated remote code execution and lateral movement. #VMwareFlaw #RemoteCodeExec #USA https://t.co/2eu5QdYt5C
@TweetThreatNews
27 Jan 2026
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA confirms active exploitation of critical VMware vCenter RCE flaw CVE-2024-37079. Sovereign Protocol: Immediately audit all virtualization infrastructure, implement network segmentation, deploy zero-trust access controls, and establish offline backup systems. Enterprise
@sovereignexec
27 Jan 2026
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔗 https://t.co/psRNNfG2uG CISA has added CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog. This critical flaw in VMware vCenter Server allows remote code execution through a heap overflow in the DCE/RPC protocol. #MADSecurity #CISA
@MADSecurityLLC
27 Jan 2026
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware vCenter Server ciblé par CVE-2024-37079, la CISA confirme une exploitation active https://t.co/dItF2TmGLm #PreventionInternet #Cybersécurité
@Prevention_web
27 Jan 2026
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers are actively exploiting a critical CVSS 9.8 vulnerability - from 2024 - in VMware vCenter Server. Info for CVE-2024-37079, incl. fix info, at SecAlerts: https://t.co/SwKxgK0R2r #ciso #cio #cto #vulnerabilities #cybersecurity #msp #mssp #secalerts #CVE202437079 #VMware
@SecAlertsCo
27 Jan 2026
126 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
VMware vCenter CVE-2024-37079 (RCE, CVSS 9.8) is now in CISA’s KEV catalog - it’s being actively exploited. Patch now and segment the management plane. https://t.co/t7lvoTOX6w #infosec #CVE2024-37079 #RCE
@CyberDaily_News
27 Jan 2026
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2025-0072 2 - CVE-2026-23760 3 - CVE-2025-27237 4 - CVE-2024-37079 5 - CVE-2026-24061 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
27 Jan 2026
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical 9.8 CVSS flaw in VMware vCenter Server’s DCERPC (CVE-2024-37079) enables remote code execution. Exploits ongoing despite a patch issued over a year ago. CISA mandates federal fixes by Feb 13. #vCenter #CISA #USA https://t.co/vqJcJUMI8l
@TweetThreatNews
27 Jan 2026
195 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Flags Actively Exploited VMware vCenter RCE (CVE-2024-37079) in KEV Catalog CISA added CVE-2024-37079 (CVSS 9.8) to its Known Exploited Vulnerabilities list after confirmation of in-the-wild exploitation, despite the flaw being patched back in June 2024. A successful
@ThreatSynop
26 Jan 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚡️ Cybersecurity Developments in the Last 12 Hours ⚡️ ☁️ CISA warns a critical VMware vCenter RCE (CVE-2024-37079) is being actively exploited in the wild ⚡️ ESET attributes a failed December wiper attack on Poland’s power grid to Sandworm, highlighting ongoin
@greytech_ltd
26 Jan 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-37079 ⚠️ VMware vCenter – Actively Exploited Network-Based RCE (CISA KEV) CISA has added CVE-2024-37079 to its KEV catalogue following confirmation of active in-the-wild exploitation targeting VMware vCenter Server. The flaw is an out-of-bounds write in the
@modat_magnify
26 Jan 2026
683 Impressions
2 Retweets
3 Likes
3 Bookmarks
0 Replies
0 Quotes
CISA reports active exploitation of critical VMware vCenter Server RCE flaw CVE-2024-37079 allowing unauthenticated remote code execution via DCERPC heap overflow. Patch released by Broadcom. #VMware #RCE #USA https://t.co/svFbtUWSXT
@TweetThreatNews
26 Jan 2026
174 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns VMware vCenter Critical RCE (CVE-2024-37079) Is Now Actively Exploited CISA confirmed in-the-wild exploitation of CVE-2024-37079 (CVSS 9.8), a vCenter Server DCERPC heap overflow enabling unauthenticated remote code execution via crafted network packets. With no
@ThreatSynop
26 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ثغرة أمنية (CVE-2024-37079، بتقييم CVSS عند 9.8) في خادم @VMware vCenter تتيح اختراق النظام عن بعد، أدرجتها @CISAgov بقائمة الثغرات المستغلة فعلياً. يحدث الخلل في معالجة بيانا
@cyberscastx
26 Jan 2026
712 Impressions
0 Retweets
3 Likes
4 Bookmarks
1 Reply
0 Quotes
🛑 VMware vCenter : la CVE-2024-37079 est activement exploitée d'après la CISA 👇 Tous les détails par ici - https://t.co/WUTtmsfVfy #vmware #infosec #cybersecurite https://t.co/cDsWrs7Vye
@ITConnect_fr
26 Jan 2026
442 Impressions
1 Retweet
2 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 26 🔴 CRITICAL: • React RCE (CVE-2025-55182) - ACTIVE EXPLOITATION • VMware vCenter RCE (CVE-2024-37079) • 150+ malicious URLs (Mozi/Mirai) ⚠️ PATCH IMMEDIATELY 🛡️ Block: 182.127.30.227 #ThreatIntel #Cybersecurity
@404LABSx
26 Jan 2026
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Vulnerabilidad crítica VMware (CVE-2024-37079) 📌 Permite ejecución remota de código con solo enviar un paquete malicioso. 🔧 Solución: aplicar parches de VMware de inmediato. 🔐 Revisa accesos de red. https://t.co/jIzY9wG0xF #ciberseguridad #VMware
@Infordisa
26 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢CISA เพิ่มช่องโหว่ VMware vCenter (CVE-2024-37079) ลงบัญชี KEV หลังพบการโจมตีจริง #NCSA #CybersecurityNewสามารถติดตามข่าวสารได้ที่ สามารถ
@ThaiCERTByNCSA
26 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA adds CVE-2024-37079 to KEV 🚨 A critical VMware vCenter Server flaw (CVSS 9.8) is now confirmed exploited in the wild. 🔗 Full analysis https://t.co/FlolRX6xFj #CVE202437079 #VMware #CISA #KEV #CyberSecurity #InfoSec #Vulert
@vulert_official
26 Jan 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog @Securizame @SecMcaballero @cibercapitan https://t.co/RmvM3nQkxP
@ciberconsejo
26 Jan 2026
89 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Adds VMware vCenter RCE (CVE-2024-37079) to KEV After Active Exploitation Reports CISA added CVE-2024-37079 to the Known Exploited Vulnerabilities catalog after confirming in-the-wild exploitation of the VMware vCenter Server flaw, which can enable unauthenticated remot
@ThreatSynop
26 Jan 2026
57 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨Fortinet、パッチ済みデバイスに対するFortiCloud SSO悪用攻撃について認める:CVE-2025-59718 ⚠️VMware vCenterの脆弱性が悪用される、CISAがKEVカタログに追加:CVE-2024-37079 〜サイバーセキュリティ週末の話題〜 https
@MachinaRecord
26 Jan 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA將VMware vCenter CVE-2024-37079列入KEV,確認已遭野外利用。CVSS 9.8 DCE/RPC Heap Overflow 可達成未認證 RCE。此為vCenter DCERPC第五個嚴重漏洞,中國APT 組織UNC3886、Fire Ant曾利用同系列漏洞攻擊。 ref:https://t.co/80WDZ8C2yl @PTTNetSe
@lfcba8178
26 Jan 2026
80 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/2orGb1porT via @TheHackersNews
@DCICyberSecNews
25 Jan 2026
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/GGcsVzPxYJ
@DeepBlueInfoSec
25 Jan 2026
81 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA、現在悪用されているVMware vCenterの脆弱性CVE-2024-37079をKEVカタログに追加 CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog #HackerNews (Jan 24) https://t.co/Cm6YxnO84z
@foxbook
25 Jan 2026
303 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAが既知の脆弱性1件をカタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Jan 23) CVE-2024-37079 Broadcom VMware vCenter Server の境界外書き込み脆弱性 https://t.co/EsrULUVmef
@foxbook
25 Jan 2026
288 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA adds critical VMware vCenter vulnerability CVE-2024-37079 to KEV catalog amid active exploitation. Agencies urged to update by Feb 13, 2026. Link: https://t.co/QvkKql1HzB #Security #Vulnerability #Exploitation #Update #Alert #Technology #Software #Patch #Protection #Risk htt
@dailytechonx
25 Jan 2026
85 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米国CISAが悪用を確認した脆弱性 #KEV をカタログに追加しました。(1/23追加) 🛡️No.1495 CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability ============= CVSSスコア: 9.8 (Base) / VMware CVSS:3.1/AV:N/AC:L/PR:N/UI:N
@piyokango
25 Jan 2026
3447 Impressions
2 Retweets
10 Likes
2 Bookmarks
0 Replies
0 Quotes
The vulnerability, tracked as CVE-2024-37079, is an out-of-bounds write flaw in vCenter Server's implementation of the DCERPC protocol that earned a 9.8 out of 10 CVSS rating. In other words: it's almost as bad as it gets. #cybersecurity https://t.co/9EgSvDqAVo
@cybertzar
25 Jan 2026
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds critical VMware vCenter Server vulnerability (CVE-2024-37079) to KEV catalog. Immediate patching required to prevent active exploitation. Link: https://t.co/2W7czjpbyo #Security #Vulnerability #Patch #Exploitation #Threat #CISA #Server #Software #Update #Protection http
@dailytechonx
25 Jan 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The U.S. CISA has added a critical VMware vCenter Server flaw (CVE-2024-37079) to its Known Exploited Vulnerabilities catalog after evidence of real-world exploitation. 📌 Full story: https://t.co/ADkT4ey9gL Source: The Hacker News
@NovaSignal
25 Jan 2026
50 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Heads up for small & medium businesses: VMware vCenter flaw CVE-2024-37079 is active in the wild and now on CISA KEV. Patch fast, confirm you’re patched, and watch for odd access patterns. No doom-and-gloom, just good housekeeping. https://t.co/Ex0a4IGvGj
@StrongKeepCyber
25 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/sdVRm7a2sU
@PVynckier
25 Jan 2026
61 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 25, 2026 🔥 1,494 exploited CVEs (CISA) ⚡ Active: Mozi botnet, RedLineStealer 🎯 VMware vCenter RCE (CVE-2024-37079) 🚫 Block: 64.34.87.123 #ThreatIntel #InfoSec
@404LABSx
25 Jan 2026
66 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2026-22812 2 - CVE-2024-37079 3 - CVE-2026-24061 4 - CVE-2025-56005 5 - CVE-2025-5419 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
25 Jan 2026
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #CISA ajoute la faille critique CVE-2024-37079 de #VMware vCenter à son catalogue KEV, suite à des exploitations actives. Score CVSS : 9.8. M à J en juin 2024. #CyberSecurity #calimeg https://t.co/kKT9dJOAEM
@meg_ai_fr
25 Jan 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds VMware vCenter flaw CVE-2024-37079 (CVSS 9.8) to KEV catalog. Hackers are actively exploiting this RCE bug. Patch immediately. #VMware #CyberSecurity #CVE202437079 #CISA #RCE #InfoSec #vCenter #Broadcom https://t.co/U5ZM4Bape2
@the_yellow_fall
25 Jan 2026
247 Impressions
1 Retweet
3 Likes
1 Bookmark
0 Replies
0 Quotes
CISA ajoute une faille critique de VMware vCenter Server (CVE-2024-37079) à son catalogue KEV. Exploitée activement, elle nécessite une mise à jour urgente. #Cybersecurity #Vulnerability https://t.co/7jgMaupZp1
@cyberwatcher_
25 Jan 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CISA adds VMware vCenter vulnerability CVE-2024-37079 to the Known Exploited Vulnerabilities catalog after active exploitation. Patch now! https://t.co/cD1xJPO0m3
@sctocs25
25 Jan 2026
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ثغرة VMware vCenter تحت المراقبة المشددة CISA أضافت ثغرة CVE-2024-37079 في VMware vCenter Server إلى قائمة الثغرات المستغلة حالياً. تم إصدار تحديث لهذه الثغرة في يونيو 2024. استغ
@MisbarSec
24 Jan 2026
184 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7FA8DFE6-9C74-4711-A8AF-3B170876A1F9",
"versionEndExcluding": "5.2",
"versionStartIncluding": "4.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B"
}
],
"operator": "OR"
}
]
}
]