### [CVE-2024-38812](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-38812) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=4.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=4.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=5.x%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.00%20&color=brightgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-122%20Heap-based%20Buffer%20Overflow&color=brightgreen) ### Description The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution. ### POC #### Reference No PoCs from references. #### Github - https://github.com/20142995/nuclei-templates - https://github.com/Ostorlab/KEV - https://github.com/ascii42/check_vmware_cve - https://github.com/cyb3r-w0lf/nuclei-template-collection - https://github.com/groshi/CVE-2024-38812-POC-5-Hands-Private - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/packetinside/CISA_BOT - https://github.com/ums91/CISA_BOT