CVE-2024-37085
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 03, 2024
- Published Date
- June 25, 2024
- Last Updated
- August 02, 2024
- Vendor
- n/a
- Product
- VMware ESXi, VMware Cloud Foundation
- Description
- VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CVSS Scores
CVSS v3.1
6.8 - MEDIUM
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
SSVC Information
- Exploitation
- active
- Technical Impact
- total
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-07-30 00:00:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
mahmutaymahmutay/CVE-2024-37085
Type: github • Created: 2024-08-02 13:31:59 UTC • Stars: 2
Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)