CVE-2024-37085

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full...

Basic Information

CVE State
PUBLISHED
Reserved Date
June 03, 2024
Published Date
June 25, 2024
Last Updated
August 02, 2024
Vendor
n/a
Product
VMware ESXi, VMware Cloud Foundation
Description
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

CVSS Scores

CVSS v3.1

6.8 - MEDIUM

Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H

SSVC Information

Exploitation
active
Technical Impact
total

Exploit Status

Exploited in the Wild
Yes (added 2024-07-30 00:00:00 UTC) Source
Proof of Concept Available
Yes (added 2024-08-02 13:31:59 UTC) Source
Used in Malware
Yes (added 2024-07-30 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
CISA 2024-07-30 00:00:00 UTC

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

mahmutaymahmutay/CVE-2024-37085

Type: github • Created: 2024-08-02 13:31:59 UTC • Stars: 2

Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)