CVE-2024-37085
VMware ESXi Authentication Bypass Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
3Exploited in Wild
YesDecision
Descriptions
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CVSS Scores
SSVC
- Decision:Act
Timeline
- 2024-06-03 CVE Reserved
- 2024-06-25 CVE Published
- 2024-07-30 Exploited in Wild
- 2024-08-02 CVE Updated
- 2024-08-02 First Exploit
- 2024-08-20 KEV Due Date
- 2024-11-28 EPSS Updated
CWE
- CWE-305: Authentication Bypass by Primary Weakness
CAPEC
References (4)
URL | Tag | Source |
---|---|---|
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505 |
URL | Date | SRC |
---|---|---|
https://github.com/mahmutaymahmutay/CVE-2024-37085 | 2024-08-02 | |
https://github.com/Florian-Hoth/CVE-2024-37085-RCE-POC | 2024-08-06 | |
https://github.com/WTN-arny/CVE-2024-37085 | 2024-08-18 |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Vmware Search vendor "Vmware" | Cloud Foundation Search vendor "Vmware" for product "Cloud Foundation" | * | - |
Affected
| ||||||
Vmware Search vendor "Vmware" | Esxi Search vendor "Vmware" for product "Esxi" | * | - |
Affected
|