CVE Vulnerabilities

CVE-2024-37085

Improper Authentication

Published: Jun 25, 2024 | Modified: Oct 30, 2025
CVSS 3.x
7.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu
root.io logo minimus.io logo echo.ai logo

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group (ESXi Admins by default) after it was deleted from AD.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

NameVendorStart VersionEnd Version
Cloud_foundationVmware4.0 (including)5.2 (excluding)
EsxiVmware7.0 (including)7.0 (including)
EsxiVmware8.0 (including)8.0 (including)
EsxiVmware8.0-a (including)8.0-a (including)
EsxiVmware8.0-b (including)8.0-b (including)
EsxiVmware8.0-c (including)8.0-c (including)
EsxiVmware8.0-update_1 (including)8.0-update_1 (including)
EsxiVmware8.0-update_1a (including)8.0-update_1a (including)
EsxiVmware8.0-update_1c (including)8.0-update_1c (including)
EsxiVmware8.0-update_1d (including)8.0-update_1d (including)
EsxiVmware8.0-update_2 (including)8.0-update_2 (including)
EsxiVmware8.0-update_2b (including)8.0-update_2b (including)
EsxiVmware8.0-update_2c (including)8.0-update_2c (including)

Potential Mitigations

References