CVE Vulnerabilities

CVE-2024-37085

Improper Authentication

Published: Jun 25, 2024 | Modified: Dec 20, 2024
CVSS 3.x
7.2
HIGH
Source:
NVD
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
CVSS 2.x
RedHat/V2
RedHat/V3
Ubuntu

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group (ESXi Admins by default) after it was deleted from AD.

Weakness

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

Affected Software

Name Vendor Start Version End Version
Cloud_foundation Vmware 4.0 (including) 5.2 (excluding)
Esxi Vmware 7.0 (including) 7.0 (including)
Esxi Vmware 8.0 (including) 8.0 (including)
Esxi Vmware 8.0-a (including) 8.0-a (including)
Esxi Vmware 8.0-b (including) 8.0-b (including)
Esxi Vmware 8.0-c (including) 8.0-c (including)
Esxi Vmware 8.0-update_1 (including) 8.0-update_1 (including)
Esxi Vmware 8.0-update_1a (including) 8.0-update_1a (including)
Esxi Vmware 8.0-update_1c (including) 8.0-update_1c (including)
Esxi Vmware 8.0-update_1d (including) 8.0-update_1d (including)
Esxi Vmware 8.0-update_2 (including) 8.0-update_2 (including)
Esxi Vmware 8.0-update_2b (including) 8.0-update_2b (including)
Esxi Vmware 8.0-update_2c (including) 8.0-update_2c (including)

Potential Mitigations

References