### [CVE-2024-37079](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37079) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%205.x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0%3C%208.0%20U2d%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Heap-overflow%20vulnerability&color=brighgreen) ### Description vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile