- Who are we?
Strategic IT partner
Count on our expertise to accelerate your digitisation
- Maximum partnerships with A+ brands
- Mountains of experience in thousands of environments
- Unrivalled expertise in cybersecurity
- Up to 24/7 monitoring & support
- Core healthy business for +30 years
- +200 Certified employees with passion
- Sober, knowledgeable advice
- Unique puzzle of proven top solutions
From advice until installation, from support until complete relief.
We are ready! - Services
IT Analyses, Consulting, installations...
- General IT Analysis and InstallationsA new look at your environment by our specialists
- Applications (Dynamics 365 ERP/CRM, Microsoft 365, Copilot...)Work more efficiently (together) with Dynamics 365 & Microsoft 365, among others
- Cybersecurity AuditCertified experts uncover every vulnerability
- Wi-Fi SurveyDetect and fix jammers and hard-to-reach areas
- Licence Audit (Software Asset Management)Are all licences in order? You can often optimise and save a lot!
- Solutions
- Events
Accelerate your digitalization.
Get an interactive tour of state-of-the art solutions. - Jobs
Join our team from Turnhout, Houthalen and/or Geel.
You end up in a 'Great Place To Work!'From advice until installation, from support until complete relief.
We are ready! - Contact
- Customer Area
As a customer, you can manage support tickets, quotes and licences yourself.
Request access via business@vanroey.beNeed a login or request a quote? Contact us via internalsales@vanroey.be | 014 470 600
VMware vCenter Server multiple heap-overflow
VMware has fixed 2 critical vulnerabilities (CVE-2024-37079 + CVE-2024-37080) impacting vCenter Server versions 7.0 & 8.0, as well as Cloud Foundation versions 4.x & 5.x.
A hacker with network access to the vCenter Server could exploit this vulnerability by sending a specially crafted network packet that might lead to execution of external code. For now, Broadcom has not received any reports of abuse of this vulnerability.
Both CVEs are 'heap-overflow' vulnerabilities in the implementation of the DCE/RPC protocol. They have high risk scores because the attacks can be performed remotely without any user interaction.
Take action
So upgrading/patching is a must. Temporarily, you could also restrict access via advanced firewall configurations to minimise possible attack attempts.
Customers who use our Managed Services enjoy are safe. They have since been patched or are being patched by appointment.
The impact of the operation/upgrade is that VCenter needs to be restarted, which (only) VCenter unreachable for up to one hour.
Feel free to contact us to fix this problem for you. You can do this by mail at support@vanroey.be or count: 014 470 600. You can also have a create a ticket.
Can't create tickets? Ask here to get an account. If our Engineer needs to remotely control your PC, he or she will ask you to run this software .