CVE-2024-37079
Published Jun 18, 2024
Last updated 5 hours ago
AI description
CVE-2024-37079 is a heap-overflow vulnerability found within the DCERPC protocol implementation of VMware vCenter Server. This flaw allows a malicious actor with network access to the vCenter Server to send specially crafted network packets. Successful exploitation of this vulnerability can lead to remote code execution on the affected server. This vulnerability has been observed to be actively exploited in the wild.
- Description
- vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.
- Source
- security@vmware.com
- NVD status
- Analyzed
- Products
- cloud_foundation, vcenter_server
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
Data from CISA
- Vulnerability name
- Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability
- Exploit added on
- Jan 23, 2026
- Exploit action due
- Feb 13, 2026
- Required action
- Apply mitigations per vendor instructions, follow applicable BOD 22-01 guidance for cloud services, or discontinue use of the product if mitigations are unavailable.
Hype score is a measure of social media activity compared against trending CVEs from the past 12 months. Max score 100.
- Hype score
11
⚡️ Cybersecurity Developments in the Last 12 Hours ⚡️ ☁️ CISA warns a critical VMware vCenter RCE (CVE-2024-37079) is being actively exploited in the wild ⚡️ ESET attributes a failed December wiper attack on Poland’s power grid to Sandworm, highlighting ongoin
@greytech_ltd
26 Jan 2026
7 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2024-37079 ⚠️ VMware vCenter – Actively Exploited Network-Based RCE (CISA KEV) CISA has added CVE-2024-37079 to its KEV catalogue following confirmation of active in-the-wild exploitation targeting VMware vCenter Server. The flaw is an out-of-bounds write in the
@modat_magnify
26 Jan 2026
380 Impressions
2 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CISA reports active exploitation of critical VMware vCenter Server RCE flaw CVE-2024-37079 allowing unauthenticated remote code execution via DCERPC heap overflow. Patch released by Broadcom. #VMware #RCE #USA https://t.co/svFbtUWSXT
@TweetThreatNews
26 Jan 2026
113 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Warns VMware vCenter Critical RCE (CVE-2024-37079) Is Now Actively Exploited CISA confirmed in-the-wild exploitation of CVE-2024-37079 (CVSS 9.8), a vCenter Server DCERPC heap overflow enabling unauthenticated remote code execution via crafted network packets. With no
@ThreatSynop
26 Jan 2026
33 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
ثغرة أمنية (CVE-2024-37079، بتقييم CVSS عند 9.8) في خادم @VMware vCenter تتيح اختراق النظام عن بعد، أدرجتها @CISAgov بقائمة الثغرات المستغلة فعلياً. يحدث الخلل في معالجة بيانا
@cyberscastx
26 Jan 2026
461 Impressions
0 Retweets
3 Likes
4 Bookmarks
1 Reply
0 Quotes
🛑 VMware vCenter : la CVE-2024-37079 est activement exploitée d'après la CISA 👇 Tous les détails par ici - https://t.co/WUTtmsfVfy #vmware #infosec #cybersecurite https://t.co/cDsWrs7Vye
@ITConnect_fr
26 Jan 2026
112 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 26 🔴 CRITICAL: • React RCE (CVE-2025-55182) - ACTIVE EXPLOITATION • VMware vCenter RCE (CVE-2024-37079) • 150+ malicious URLs (Mozi/Mirai) ⚠️ PATCH IMMEDIATELY 🛡️ Block: 182.127.30.227 #ThreatIntel #Cybersecurity
@404LABSx
26 Jan 2026
66 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 Vulnerabilidad crítica VMware (CVE-2024-37079) 📌 Permite ejecución remota de código con solo enviar un paquete malicioso. 🔧 Solución: aplicar parches de VMware de inmediato. 🔐 Revisa accesos de red. https://t.co/jIzY9wG0xF #ciberseguridad #VMware
@Infordisa
26 Jan 2026
6 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📢CISA เพิ่มช่องโหว่ VMware vCenter (CVE-2024-37079) ลงบัญชี KEV หลังพบการโจมตีจริง #NCSA #CybersecurityNewสามารถติดตามข่าวสารได้ที่ สามารถ
@ThaiCERTByNCSA
26 Jan 2026
37 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA adds CVE-2024-37079 to KEV 🚨 A critical VMware vCenter Server flaw (CVSS 9.8) is now confirmed exploited in the wild. 🔗 Full analysis https://t.co/FlolRX6xFj #CVE202437079 #VMware #CISA #KEV #CyberSecurity #InfoSec #Vulert
@vulert_official
26 Jan 2026
2 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog @Securizame @SecMcaballero @cibercapitan https://t.co/RmvM3nQkxP
@ciberconsejo
26 Jan 2026
89 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Adds VMware vCenter RCE (CVE-2024-37079) to KEV After Active Exploitation Reports CISA added CVE-2024-37079 to the Known Exploited Vulnerabilities catalog after confirming in-the-wild exploitation of the VMware vCenter Server flaw, which can enable unauthenticated remot
@ThreatSynop
26 Jan 2026
48 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
🚨Fortinet、パッチ済みデバイスに対するFortiCloud SSO悪用攻撃について認める:CVE-2025-59718 ⚠️VMware vCenterの脆弱性が悪用される、CISAがKEVカタログに追加:CVE-2024-37079 〜サイバーセキュリティ週末の話題〜 https
@MachinaRecord
26 Jan 2026
40 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA將VMware vCenter CVE-2024-37079列入KEV,確認已遭野外利用。CVSS 9.8 DCE/RPC Heap Overflow 可達成未認證 RCE。此為vCenter DCERPC第五個嚴重漏洞,中國APT 組織UNC3886、Fire Ant曾利用同系列漏洞攻擊。 ref:https://t.co/80WDZ8C2yl @PTTNetSe
@lfcba8178
26 Jan 2026
76 Impressions
0 Retweets
1 Like
1 Bookmark
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/2orGb1porT via @TheHackersNews
@DCICyberSecNews
25 Jan 2026
11 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/GGcsVzPxYJ
@DeepBlueInfoSec
25 Jan 2026
81 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
CISA、現在悪用されているVMware vCenterの脆弱性CVE-2024-37079をKEVカタログに追加 CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog #HackerNews (Jan 24) https://t.co/Cm6YxnO84z
@foxbook
25 Jan 2026
303 Impressions
0 Retweets
2 Likes
0 Bookmarks
0 Replies
0 Quotes
CISAが既知の脆弱性1件をカタログに追加 CISA Adds One Known Exploited Vulnerability to Catalog #CISA (Jan 23) CVE-2024-37079 Broadcom VMware vCenter Server の境界外書き込み脆弱性 https://t.co/EsrULUVmef
@foxbook
25 Jan 2026
287 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA adds critical VMware vCenter vulnerability CVE-2024-37079 to KEV catalog amid active exploitation. Agencies urged to update by Feb 13, 2026. Link: https://t.co/QvkKql1HzB #Security #Vulnerability #Exploitation #Update #Alert #Technology #Software #Patch #Protection #Risk htt
@dailytechonx
25 Jan 2026
85 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米国CISAが悪用を確認した脆弱性 #KEV をカタログに追加しました。(1/23追加) 🛡️No.1495 CVE-2024-37079 Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability ============= CVSSスコア: 9.8 (Base) / VMware CVSS:3.1/AV:N/AC:L/PR:N/UI:N
@piyokango
25 Jan 2026
3447 Impressions
2 Retweets
10 Likes
2 Bookmarks
0 Replies
0 Quotes
The vulnerability, tracked as CVE-2024-37079, is an out-of-bounds write flaw in vCenter Server's implementation of the DCERPC protocol that earned a 9.8 out of 10 CVSS rating. In other words: it's almost as bad as it gets. #cybersecurity https://t.co/9EgSvDqAVo
@cybertzar
25 Jan 2026
64 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds critical VMware vCenter Server vulnerability (CVE-2024-37079) to KEV catalog. Immediate patching required to prevent active exploitation. Link: https://t.co/2W7czjpbyo #Security #Vulnerability #Patch #Exploitation #Threat #CISA #Server #Software #Update #Protection http
@dailytechonx
25 Jan 2026
56 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
The U.S. CISA has added a critical VMware vCenter Server flaw (CVE-2024-37079) to its Known Exploited Vulnerabilities catalog after evidence of real-world exploitation. 📌 Full story: https://t.co/ADkT4ey9gL Source: The Hacker News
@NovaSignal
25 Jan 2026
50 Impressions
1 Retweet
2 Likes
0 Bookmarks
0 Replies
0 Quotes
Heads up for small & medium businesses: VMware vCenter flaw CVE-2024-37079 is active in the wild and now on CISA KEV. Patch fast, confirm you’re patched, and watch for odd access patterns. No doom-and-gloom, just good housekeeping. https://t.co/Ex0a4IGvGj
@StrongKeepCyber
25 Jan 2026
45 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/sdVRm7a2sU
@PVynckier
25 Jan 2026
61 Impressions
1 Retweet
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 THREAT ALERT - Jan 25, 2026 🔥 1,494 exploited CVEs (CISA) ⚡ Active: Mozi botnet, RedLineStealer 🎯 VMware vCenter RCE (CVE-2024-37079) 🚫 Block: 64.34.87.123 #ThreatIntel #InfoSec
@404LABSx
25 Jan 2026
66 Impressions
1 Retweet
1 Like
0 Bookmarks
0 Replies
0 Quotes
Top 5 Trending CVEs: 1 - CVE-2026-22812 2 - CVE-2024-37079 3 - CVE-2026-24061 4 - CVE-2025-56005 5 - CVE-2025-5419 #cve #cvetrends #cveshield #cybersecurity https://t.co/4Fua3CAN6W
@CVEShield
25 Jan 2026
10 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 #CISA ajoute la faille critique CVE-2024-37079 de #VMware vCenter à son catalogue KEV, suite à des exploitations actives. Score CVSS : 9.8. M à J en juin 2024. #CyberSecurity #calimeg https://t.co/kKT9dJOAEM
@meg_ai_fr
25 Jan 2026
0 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA adds VMware vCenter flaw CVE-2024-37079 (CVSS 9.8) to KEV catalog. Hackers are actively exploiting this RCE bug. Patch immediately. #VMware #CyberSecurity #CVE202437079 #CISA #RCE #InfoSec #vCenter #Broadcom https://t.co/U5ZM4Bape2
@the_yellow_fall
25 Jan 2026
247 Impressions
1 Retweet
3 Likes
1 Bookmark
0 Replies
0 Quotes
CISA ajoute une faille critique de VMware vCenter Server (CVE-2024-37079) à son catalogue KEV. Exploitée activement, elle nécessite une mise à jour urgente. #Cybersecurity #Vulnerability https://t.co/7jgMaupZp1
@cyberwatcher_
25 Jan 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
1 Reply
0 Quotes
CISA adds VMware vCenter vulnerability CVE-2024-37079 to the Known Exploited Vulnerabilities catalog after active exploitation. Patch now! https://t.co/cD1xJPO0m3
@sctocs25
25 Jan 2026
51 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 ثغرة VMware vCenter تحت المراقبة المشددة CISA أضافت ثغرة CVE-2024-37079 في VMware vCenter Server إلى قائمة الثغرات المستغلة حالياً. تم إصدار تحديث لهذه الثغرة في يونيو 2024. استغ
@MisbarSec
24 Jan 2026
184 Impressions
0 Retweets
4 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA Flags Actively Exploited VMware vCenter RCE (CVE-2024-37079) in KEV Catalog CISA confirmed in-the-wild exploitation of CVE-2024-37079, a critical out-of-bounds write flaw in VMware vCenter’s DCERPC implementation that can allow unauthenticated remote code execution vi
@ThreatSynop
24 Jan 2026
105 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA ajoute une faille critique de VMware vCenter Server (CVE-2024-37079) à son catalogue KEV. Exploitée activement, elle nécessite une mise à jour urgente. #Cybersecurity #Vulnerability https://t.co/7jgMaupZp1
@cyberwatcher_
24 Jan 2026
75 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
La CISA añadió la vulnerabilidad CVE-2024-37079 de VMware vCenter Server, que permite ejecución remota de código, a su lista de fallas explotadas. Se recomienda monitorear tráfico y revisar registros. Mas información: https://t.co/YFCqGHuQTG https://t.co/vwrs17FXTW
@CSIRT_Telconet
24 Jan 2026
169 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
A critical vulnerability in VMware vCenter Server, tracked as CVE-2024-37079, is being actively exploited. This out-of-bounds write flaw, rated 9.8 on the CVSS scale, allows remote code execution via specially crafted network packets. https://t.co/p6DIpHfnyD
@securityRSS
24 Jan 2026
87 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter #flaw #CVE-2024-37079 to KEV Catalog https://t.co/HfZIB4bJiO
@AdliceSoftware
24 Jan 2026
111 Impressions
0 Retweets
1 Like
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/H9K37XiNrJ #CyberSecurity
@EpicPlain
24 Jan 2026
43 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Critical VMware vCenter RCE Flaw CVE-2024-37079 Under Active Attack #CyberSecurity #cyashadotcom #DeepikaPadukone https://t.co/XuP5gPRgfm
@cyashadotcom
24 Jan 2026
256 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
🚨 CISA adds actively exploited VMware vCenter flaw CVE-2024-37079 to KEV Catalog! Urgent action required: patch your systems immediately. #VMware #CyberSecurity https://t.co/JVhoHSKgRM
@xcybersecnews
24 Jan 2026
48 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
米CISAがVMware vCenter Serverの深刻な欠陥について、実際に攻撃が確認されたとして危険度の高い脆弱性一覧に追加した。既に修正済みの問題だが、企業や行政システムへの影響が改めて懸念され、対応の遅れがリ
@yousukezan
24 Jan 2026
1637 Impressions
7 Retweets
13 Likes
6 Bookmarks
0 Replies
0 Quotes
🚨 CISA Adds Actively Exploited VMware vCenter Critical RCE (CVE-2024-37079) to KEV Catalog CISA added VMware vCenter Server flaw CVE-2024-37079 (CVSS 9.8) to the KEV list after confirmed in-the-wild exploitation, as the issue stems from a DCE/RPC heap overflow that can enable
@ThreatSynop
24 Jan 2026
65 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/RhOgwivzNN
@Dinosn
24 Jan 2026
860 Impressions
3 Retweets
8 Likes
1 Bookmark
0 Replies
0 Quotes
🚨 CISA Flags Actively Exploited VMware vCenter RCE (CVE-2024-37079) and Adds It to KEV CISA added VMware vCenter Server flaw CVE-2024-37079 (CVSS 9.8) to its Known Exploited Vulnerabilities (KEV) catalog after confirmed in-the-wild exploitation, citing a DCE/RPC heap overflow
@ThreatSynop
24 Jan 2026
42 Impressions
0 Retweets
0 Likes
1 Bookmark
0 Replies
0 Quotes
#CISA Adds Actively #Exploited VMware #vCenter Flaw #CVE-2024-37079 to KEV Catalog https://t.co/03EEeEIofA
@ScyScan
24 Jan 2026
38 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA added actively exploited VMware vCenter flaw (CVE-2024-37079, CVSS 9.8) to KEV list! Patch ASAP! 🚨 https://t.co/qoSDJNY1u5 #CISA #VMware #CVE202437079 #KEV #CyberSecurity
@0xT3chn0m4nc3r
24 Jan 2026
1 Impression
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Check out this summarized news story 👀 CISA Includes VMware vCenter Flaw CVE-2024-37079 in KEV Catalog https://t.co/6TxWckgpQW
@mynewswave
24 Jan 2026
34 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/BpfYUDbPTa https://t.co/TFvTsgKN2K
@talentxfactor
24 Jan 2026
42 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📌 أضافت وكالة الأمن السيبراني الأميركية CISA ثغرة حاسمة تؤثر في Broadcom VMware vCenter Server، والتي تم إصلاحها في يونيو 2024، إلى قائمة الثغرات المعروفة المستغلة KEV، مع
@Cybercachear
24 Jan 2026
67 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
📍CISA Adds Actively Exploited VMware vCenter Flaw CVE-2024-37079 to KEV Catalog https://t.co/VwWJp5jX3L
@cyberetweet
24 Jan 2026
58 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "7FA8DFE6-9C74-4711-A8AF-3B170876A1F9",
"versionEndExcluding": "5.2",
"versionStartIncluding": "4.0"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "CC974CA1-88D3-42E4-BF1F-28870F8171B5"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EFE63984-F69B-4593-9AEC-D179D6D98B08"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "16F3D992-9F48-4604-9AAF-DC2D1CE98BE2"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "C745A7E6-4760-48CD-B7C4-1C2C20217F21"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A5522514-8ED9-45DB-9036-33FE40D77E7D"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8C27C660-E917-4944-8B4C-41D9622B76D7"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "56CFB469-B3E6-4503-A47C-D18206D4D19A"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update1d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "67024A43-9E13-4F4E-B711-731792DA3840"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "604F559F-1775-4F29-996E-9079B99345B6"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "61DC9400-5AEE-49AC-9925-0A96E32BD8C0"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "98C1B77E-AB0E-4E8A-8294-2D3D230CDF9B"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:8.0:update2c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8EC8BEF1-7908-46C0-841A-834778D1A863"
}
],
"operator": "OR"
}
]
},
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "5FA81CCD-A05E-498C-820E-21980E92132F"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0EE83406-A3D9-4F75-A1A6-63831CEBEEC1"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "FB563627-C9CF-4D8A-B882-9AB65EAE9E15"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "DCA03B2A-48B2-48AD-B8EB-9D7BB2016819"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A2392D0F-D7A2-4E01-9212-1BA6C895AEBF"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6D731C1A-9FE5-461C-97E2-6F45E4CBABE1"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8725E544-2A94-4829-A683-1ECCE57A74A6"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0FC6765A-6584-45A8-9B21-4951D2EA8939"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "85DD238C-EF73-44F0-928E-A94FF5C4B378"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "F4CA36C1-732E-41AE-B847-F7411B753F3D"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "0DA882B6-D811-4E4B-B614-2D48F0B9036E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8D30A78E-16D0-4A2E-A2F8-F6073698243E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "188E103E-9568-4CE0-A984-141B2A9E82D2"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "B266439F-E911-4C95-9D27-88DF96DDCCD5"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "6508A908-EF14-4A72-AC75-5DA6F8B98A0E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "58597F18-0B23-4D21-9ABA-D9773958F10E"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "ADF46C54-313B-4742-A074-EEA0A6554680"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9587F800-57BC-44B6-870E-95691684FC46"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "AD148A75-5076-416D-AFD6-0F281DA0A82B"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "956CEA8C-F8C4-41BD-85B4-44FE3A772E50"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "008AEA0F-116B-4AF8-B3A7-3041CCE25235"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "EE486B2F-AED4-4FCE-A674-DFC25844FEFF"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "455DD46E-A071-476D-8914-767485E45F35"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "3A422D04-48DF-4A16-94F8-D5702CC2782D"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "806E9219-CDF4-4E62-978E-334E96A94BA6"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "34D8B182-4E71-4655-8DD8-743A3EF6DC8B"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3o:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "8D8F6CC7-6B6D-4079-9E2C-A85C4616FF92"
},
{
"criteria": "cpe:2.3:a:vmware:vcenter_server:7.0:update3p:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "A814F0AB-4AEB-4139-976F-425A4A9EC67B"
}
],
"operator": "OR"
}
]
}
]