CVE-2024-37079
Published Jun 18, 2024
Last updated 2 months ago
- Description
- vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
- Source
- security@vmware.com
- NVD status
- Analyzed
- Products
- cloud_foundation, vcenter_server
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
- Exploit added on
- Jan 23, 2026
- Exploit action due
- Feb 13, 2026
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
- Hype score
- Not currently trending
CVE-2024-37079: VMware vCenter heap overflow. One unauthenticated network packet → RCE. Actively exploited. The nerve center of your virtualization owned by a single crafted packet. Broadcom confirms ITW. Patch or pray—attackers already have admin on your hypervisors.
@CisoRaging77913
11 Mar 2026
14 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
I'm getting more and more contacts about this being actively used, so patch, patch, patch! VMSA-2024-0012:VMware vCenter Server updates address heap-overflow and privilege escalation vulnerabilities (CVE-2024-37079, CVE-2024-37080, CVE-2024-37081) #broadcom #vmware
@samilaiho
23 Feb 2026
230 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware by Broadcom has confirmed in-the-wild exploitation of CVE-2024-37079 in VMware vCenter Server, and CISA has flagged it as actively exploited with a hard remediation deadline for U.S. federal agencies of February 13, 2026. That combination (vendor confirmation + KEV-style
@TheTechWorldPod
5 Feb 2026
99 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 vCenter Server CVE-2024-37079: ITW DCERPC heap-o/f → net RCE. Exposed: reachable vCenter 7/8 + VCF. Patch: 8.0U2d/8.0U1e/7.0U3r (VCF KB88287). If not patched now: firewall vCenter to admin IPs only. https://t.co/rdjAPQEEy8
@phaneragnosis
4 Feb 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA KEV 警告 26/01/23:VMware:vCenter の脆弱性 CVE-2024-37079 を登録 https://t.co/D6LX4mU3YQ 仮想化環境の管理を担う VMware vCenter Server
@iototsecnews
2 Feb 2026
129 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ثغرة أمنية (CVE-2024-37079، بتقييم CVSS عند 9.8) في خادم @VMware vCenter تتيح اختراق النظام عن بعد، أدرجتها @CISAgov بقائمة الثغرات المستغلة فعلياً. يحدث الخلل في معالجة بيانا
@HumamJanda70980
1 Feb 2026
67 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
ALERT: VMware vCenter RCE exploit (CVE-2024-37079) actively weaponized by threat actors. SOVEREIGN PROTOCOL: Immediate network segmentation of virtualization infrastructure, deploy dedicated management VLANs, implement zero-trust access controls. #TheSovereignProtocol
@sovereignexec
30 Jan 2026
41 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA confirms active exploitation of critical VMware vCenter RCE flaw CVE-2024-37079. Threat actors achieve remote code execution via crafted network packets. Sovereign Protocol: Immediately audit all virtualization infrastructure, implement network segmentation, deploy endpoint
@sovereignexec
29 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Broadcom flags actively exploited VMware vCenter flaw (CVE-2024-37079) impacting virtualization security UpGuard notes Broadcom reported an incident tied to active exploitation of a critical out-of-bounds write in VMware vCenter Server (CVE-2024-37079) that could enable
@ThreatSynop
28 Jan 2026
50 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA orders patching of VMware vCenter critical RCE flaw (CVE-2024-37079) after June DCERPC heap-overflow fix. 1Password adds phishing alerts as AI phishing rises. Microsoft fixes Windows 11 boot issues with KB5074109. #VMware #US #PhishingProtection https://t.co/VoJos4kNw6
@TweetThreatNews
28 Jan 2026
320 Impressions
0 Retweets
3 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware vCenter Serverの1年前の脆弱性(CVE-2024-37079)がKEVに追加 https://t.co/9gjsFrXPMo #セキュリティ対策Lab #セキュリティ #Security #サイバー攻撃 #CybersecurityNews
@securityLab_jp
28 Jan 2026
23 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds CVE-2024-37079, a critical heap-overflow RCE in VMware vCenter Server, to its KEV catalog after confirming active exploitation. The flaw enables unauthenticated remote code execution and lateral movement. #VMwareFlaw #RemoteCodeExec #USA https://t.co/2eu5QdYt5C
@TweetThreatNews
27 Jan 2026
48 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA confirms active exploitation of critical VMware vCenter RCE flaw CVE-2024-37079. Sovereign Protocol: Immediately audit all virtualization infrastructure, implement network segmentation, deploy zero-trust access controls, and establish offline backup systems. Enterprise
@sovereignexec
27 Jan 2026
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🔗 https://t.co/psRNNfG2uG CISA has added CVE-2024-37079 to its Known Exploited Vulnerabilities (KEV) catalog. This critical flaw in VMware vCenter Server allows remote code execution through a heap overflow in the DCE/RPC protocol. #MADSecurity #CISA
@MADSecurityLLC
27 Jan 2026
49 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
VMware vCenter Server ciblé par CVE-2024-37079, la CISA confirme une exploitation active https://t.co/dItF2TmGLm #PreventionInternet #Cybersécurité
@Prevention_web
27 Jan 2026
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Attackers are actively exploiting a critical CVSS 9.8 vulnerability - from 2024 - in VMware vCenter Server. Info for CVE-2024-37079, incl. fix info, at SecAlerts: https://t.co/SwKxgK0R2r #ciso #cio #cto #vulnerabilities #cybersecurity #msp #mssp #secalerts #CVE202437079 #VMware
@SecAlertsCo
27 Jan 2026
126 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
VMware vCenter CVE-2024-37079 (RCE, CVSS 9.8) is now in CISA’s KEV catalog - it’s being actively exploited. Patch now and segment the management plane. https://t.co/t7lvoTOX6w #infosec #CVE2024-37079 #RCE
@CyberDaily_News
27 Jan 2026
47 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2025-0072 2 - CVE-2026-23760 3 - CVE-2025-27237 4 - CVE-2024-37079 5 - CVE-2026-24061 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
27 Jan 2026
15 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
A critical 9.8 CVSS flaw in VMware vCenter Server’s DCERPC (CVE-2024-37079) enables remote code execution. Exploits ongoing despite a patch issued over a year ago. CISA mandates federal fixes by Feb 13. #vCenter #CISA #USA https://t.co/vqJcJUMI8l
@TweetThreatNews
27 Jan 2026
195 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Flags Actively Exploited VMware vCenter RCE (CVE-2024-37079) in KEV Catalog CISA added CVE-2024-37079 (CVSS 9.8) to its Known Exploited Vulnerabilities list after confirmation of in-the-wild exploitation, despite the flaw being patched back in June 2024. A successful
@ThreatSynop
26 Jan 2026
54 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
⚡️ Cybersecurity Developments in the Last 12 Hours ⚡️ ☁️ CISA warns a critical VMware vCenter RCE (CVE-2024-37079) is being actively exploited in the wild ⚡️ ESET attributes a failed December wiper attack on Poland’s power grid to Sandworm, highlighting ongoin
@greytech_ltd
26 Jan 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-37079 ⚠️ VMware vCenter – Actively Exploited Network-Based RCE (CISA KEV) CISA has added CVE-2024-37079 to its KEV catalogue following confirmation of active in-the-wild exploitation targeting VMware vCenter Server. The flaw is an out-of-bounds write in the
@modat_magnify
26 Jan 2026
683 Impressions
2 Retweets
3 Likes
3 Bookmarks
0 Replies
0 Quotes
CISA reports active exploitation of critical VMware vCenter Server RCE flaw CVE-2024-37079 allowing unauthenticated remote code execution via DCERPC heap overflow. Patch released by Broadcom. #VMware #RCE #USA https://t.co/svFbtUWSXT
@TweetThreatNews
26 Jan 2026
174 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns VMware vCenter Critical RCE (CVE-2024-37079) Is Now Actively Exploited CISA confirmed in-the-wild exploitation of CVE-2024-37079 (CVSS 9.8), a vCenter Server DCERPC heap overflow enabling unauthenticated remote code execution via crafted network packets. With no
@ThreatSynop
26 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ثغرة أمنية (CVE-2024-37079، بتقييم CVSS عند 9.8) في خادم @VMware vCenter تتيح اختراق النظام عن بعد، أدرجتها @CISAgov بقائمة الثغرات المستغلة فعلياً. يحدث الخلل في معالجة بيانا
@cyberscastx
26 Jan 2026
712 Impressions
0 Retweets
3 Likes
4 Bookmarks
1 Reply
0 Quotes
🛑 VMware vCenter : la CVE-2024-37079 est activement exploitée d'après la CISA 👇 Tous les détails par ici - https://t.co/WUTtmsfVfy #vmware #infosec #cybersecurite https://t.co/cDsWrs7Vye
@ITConnect_fr
26 Jan 2026
442 Impressions
1 Retweet
2 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 26 🔴 CRITICAL: • React RCE (CVE-2025-55182) - ACTIVE EXPLOITATION • VMware vCenter RCE (CVE-2024-37079) • 150+ malicious URLs (Mozi/Mirai) ⚠️ PATCH IMMEDIATELY 🛡️ Block: 182.127.30.227 #ThreatIntel #Cybersecurity
@404LABSx
26 Jan 2026
78 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Vulnerabilidad crítica VMware (CVE-2024-37079) 📌 Permite ejecución remota de código con solo enviar un paquete malicioso. 🔧 Solución: aplicar parches de VMware de inmediato. 🔐 Revisa accesos de red. https://t.co/jIzY9wG0xF #ciberseguridad #VMware
@Infordisa
26 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢CISA เพิ่มช่องโหว่ VMware vCenter (CVE-2024-37079) ลงบัญชี KEV หลังพบการโจมตีจริง #NCSA #CybersecurityNewสามารถติดตามข่าวสารได้ที่ สามารถ
@ThaiCERTByNCSA
26 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA adds CVE-2024-37079 to KEV 🚨 A critical VMware vCenter Server flaw (CVSS 9.8) is now confirmed exploited in the wild. 🔗 Full analysis https://t.co/FlolRX6xFj #CVE202437079 #VMware #CISA #KEV #CyberSecurity #InfoSec #Vulert
@vulert_official
26 Jan 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog @Securizame @SecMcaballero @cibercapitan https://t.co/RmvM3nQkxP
@ciberconsejo
26 Jan 2026
89 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Adds VMware vCenter RCE (CVE-2024-37079) to KEV After Active Exploitation Reports CISA added CVE-2024-37079 to the Known Exploited Vulnerabilities catalog after confirming in-the-wild exploitation of the VMware vCenter Server flaw, which can enable unauthenticated remot
@ThreatSynop
26 Jan 2026
57 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨Fortinet、パッチ済みデバイスに対するFortiCloud SSO悪用攻撃について認める:CVE-2025-59718 ⚠️VMware vCenterの脆弱性が悪用される、CISAがKEVカタログに追加:CVE-2024-37079 〜サイバーセキュリティ週末の話題〜 https
@MachinaRecord
26 Jan 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA將VMware vCenter CVE-2024-37079列入KEV,確認已遭野外利用。CVSS 9.8 DCE/RPC Heap Overflow 可達成未認證 RCE。此為vCenter DCERPC第五個嚴重漏洞,中國APT 組織UNC3886、Fire Ant曾利用同系列漏洞攻擊。 ref:https://t.co/80WDZ8C2yl @PTTNetSe
@lfcba8178
26 Jan 2026
80 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/2orGb1porT via @TheHackersNews
@DCICyberSecNews
25 Jan 2026
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/GGcsVzPxYJ
@DeepBlueInfoSec
25 Jan 2026
81 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA、現在悪用されているVMware vCenterの脆弱性CVE-2024-37079をKEVカタログに追加 CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog #HackerNews (Jan 24) https://t.co/Cm6YxnO84z
@foxbook
25 Jan 2026
303 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAが既知の脆弱性1件をカタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Jan 23) CVE-2024-37079 Broadcom VMware vCenter Server の境界外書き込み脆弱性 https://t.co/EsrULUVmef
@foxbook
25 Jan 2026
288 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA adds critical VMware vCenter vulnerability CVE-2024-37079 to KEV catalog amid active exploitation. Agencies urged to update by Feb 13, 2026. Link: https://t.co/QvkKql1HzB #Security #Vulnerability #Exploitation #Update #Alert #Technology #Software #Patch #Protection #Risk htt
@dailytechonx
25 Jan 2026
85 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米国CISAが悪用を確認した脆弱性 #KEV をカタログに追加しました。(1/23追加) 🛡️No.1495 CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability ============= CVSSスコア: 9.8 (Base) / VMware CVSS:3.1/AV:N/AC:L/PR:N/UI:N
@piyokango
25 Jan 2026
3447 Impressions
2 Retweets
10 Likes
2 Bookmarks
0 Replies
0 Quotes
The vulnerability, tracked as CVE-2024-37079, is an out-of-bounds write flaw in vCenter Server's implementation of the DCERPC protocol that earned a 9.8 out of 10 CVSS rating. In other words: it's almost as bad as it gets. #cybersecurity https://t.co/9EgSvDqAVo
@cybertzar
25 Jan 2026
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds critical VMware vCenter Server vulnerability (CVE-2024-37079) to KEV catalog. Immediate patching required to prevent active exploitation. Link: https://t.co/2W7czjpbyo #Security #Vulnerability #Patch #Exploitation #Threat #CISA #Server #Software #Update #Protection http
@dailytechonx
25 Jan 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The U.S. CISA has added a critical VMware vCenter Server flaw (CVE-2024-37079) to its Known Exploited Vulnerabilities catalog after evidence of real-world exploitation. 📌 Full story: https://t.co/ADkT4ey9gL Source: The Hacker News
@NovaSignal
25 Jan 2026
50 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Heads up for small & medium businesses: VMware vCenter flaw CVE-2024-37079 is active in the wild and now on CISA KEV. Patch fast, confirm you’re patched, and watch for odd access patterns. No doom-and-gloom, just good housekeeping. https://t.co/Ex0a4IGvGj
@StrongKeepCyber
25 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/sdVRm7a2sU
@PVynckier
25 Jan 2026
61 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 25, 2026 🔥 1,494 exploited CVEs (CISA) ⚡ Active: Mozi botnet, RedLineStealer 🎯 VMware vCenter RCE (CVE-2024-37079) 🚫 Block: 64.34.87.123 #ThreatIntel #InfoSec
@404LABSx
25 Jan 2026
66 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2026-22812 2 - CVE-2024-37079 3 - CVE-2026-24061 4 - CVE-2025-56005 5 - CVE-2025-5419 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
25 Jan 2026
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #CISA ajoute la faille critique CVE-2024-37079 de #VMware vCenter à son catalogue KEV, suite à des exploitations actives. Score CVSS : 9.8. M à J en juin 2024. #CyberSecurity #calimeg https://t.co/kKT9dJOAEM
@meg_ai_fr
25 Jan 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds VMware vCenter flaw CVE-2024-37079 (CVSS 9.8) to KEV catalog. Hackers are actively exploiting this RCE bug. Patch immediately. #VMware #CyberSecurity #CVE202437079 #CISA #RCE #InfoSec #vCenter #Broadcom https://t.co/U5ZM4Bape2
@the_yellow_fall
25 Jan 2026
247 Impressions
1 Retweet
3 Likes
1 Bookmark
0 Replies
0 Quotes
CISA ajoute une faille critique de VMware vCenter Server (CVE-2024-37079) à son catalogue KEV. Exploitée activement, elle nécessite une mise à jour urgente. #Cybersecurity #Vulnerability https://t.co/7jgMaupZp1
@cyberwatcher_
25 Jan 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
[
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "7FA8DFE6-9C74-4711-A8AF-3B170876A1F9",
"versionEndExcluding": "5.2",
"versionStartIncluding": "4.0",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
]