Zero-day exploit broker Zerodium announced it is looking for zero-day exploits for VMware vCenter Server. vCenter Server is the centralized management utility for VMware, and is used to manage virtual machines, multiple ESXi hosts, and all dependent components from a single centralized location. The company will pay up to $100,000 for zero-days in vCenter Server.
“We are looking for pre-authentication exploits affecting recent versions of vCenter Server. The exploit should allow remote code execution, work with default installations and default ports/services, and should not require any authentication or user interaction.” reads the announcement published by the zero-day broker.
Zerodium resells the exploits to its customers that include law enforcement bodies and intelligence agencies that could use them in their investigations.
The announcement is temporary likely because it comes after a request from some of its customers.
The company is searching for pre-authentication exploits that could lead to remote code execution on default installations, without user interaction.
Other temporary acquisitions run by Zerodium include Moodle and IM client tool Pidgin RCEs.
Follow me on Twitter: @securityaffairs and Facebook
[adrotate banner=”9″] | [adrotate banner=”12″] |
(SecurityAffairs – hacking, Zerodium zero-day exploit broker)
[adrotate banner=”5″]
[adrotate banner=”13″]
U.S. Cybersecurity and Infrastructure Security Agency (CISA) adds Microsoft Windows flaws to its Known Exploited…
Ivanti addressed two Endpoint Manager Mobile (EPMM) software vulnerabilities that have been exploited in limited…
Microsoft Patch Tuesday security updates for May 2025 addressed 75 security flaws across multiple products, including…
Fortinet fixed a critical remote code execution zero-day vulnerability actively exploited in attacks targeting FortiVoice…
Interlock Ransomware 's attack on a defense contractor exposed global defense supply chain details, risking…
Marks and Spencer (M&S) confirms that threat actors stole customer data in the ransomware attack…
This website uses cookies.