CVE-2024-22245
Arbitrary Authentication Relay Vulnerability in Deprecated EAP Browser Plugin
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Arbitrary Authentication Relay and Session Hijack vulnerabilities in the deprecated VMware Enhanced Authentication Plug-in (EAP) could allow a malicious actor that could trick a target domain user with EAP installed in their web browser into requesting and relaying service tickets for arbitrary Active Directory Service Principal Names (SPNs).
Las vulnerabilidades de retransmisión de autenticación arbitraria y secuestro de sesión en el obsoleto complemento de autenticación mejorada (EAP) de VMware podrían permitir que un actor malicioso engañe a un usuario de dominio de destino con EAP instalado en su navegador web para que solicite y retransmita tickets de servicio para un principal de Active Directory Service Principal Names (SPNs).
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2024-01-08 CVE Reserved
- 2024-02-20 CVE Published
- 2024-02-21 EPSS Updated
- 2024-08-27 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-287: Improper Authentication
CAPEC
- CAPEC-114: Authentication Abuse
References (1)
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
VMware Search vendor "VMware" | VMware Enhanced Authentication Plug-in (EAP) Search vendor "VMware" for product "VMware Enhanced Authentication Plug-in (EAP)" | * | en |
Affected
|