CVE-2024-37085
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full...
Basic Information
- CVE State
- PUBLISHED
- Reserved Date
- June 03, 2024
- Published Date
- June 25, 2024
- Last Updated
- August 02, 2024
- Vendor
- n/a
- Product
- VMware ESXi, VMware Cloud Foundation
- Description
- VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
- Tags
- Exploitation
- active
- Technical Impact
- total
CVSS Scores
CVSS v3.1
Vector: CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
SSVC Information
Known Exploited Vulnerability Information
Source | Added Date |
---|---|
CISA | 2024-07-30 00:00:00 UTC |
Scanner Integrations
Scanner | URL | Date Detected |
---|---|---|
Nessus | https://www.tenable.com/plugins/nessus/201123 | 2024-06-28 18:07:00 UTC |
Potential Proof of Concepts
Warning: These PoCs have not been tested and could contain malware. Use at your own risk.
mahmutaymahmutay/CVE-2024-37085
Type: github • Created: 2024-08-02 13:31:59 UTC • Stars: 2
Timeline
-
CVE ID Reserved
-
CVE Published to Public
-
Detected by Nessus
-
Exploit Used in Malware
-
Added to KEVIntel
-
Proof of Concept Exploit Available