VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group (ESXi Admins by default) after it was deleted from AD.
When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Cloud_foundation | Vmware | 4.0 (including) | 5.2 (excluding) |
Esxi | Vmware | 7.0 (including) | 7.0 (including) |
Esxi | Vmware | 8.0 (including) | 8.0 (including) |
Esxi | Vmware | 8.0-a (including) | 8.0-a (including) |
Esxi | Vmware | 8.0-b (including) | 8.0-b (including) |
Esxi | Vmware | 8.0-c (including) | 8.0-c (including) |
Esxi | Vmware | 8.0-update_1 (including) | 8.0-update_1 (including) |
Esxi | Vmware | 8.0-update_1a (including) | 8.0-update_1a (including) |
Esxi | Vmware | 8.0-update_1c (including) | 8.0-update_1c (including) |
Esxi | Vmware | 8.0-update_1d (including) | 8.0-update_1d (including) |
Esxi | Vmware | 8.0-update_2 (including) | 8.0-update_2 (including) |
Esxi | Vmware | 8.0-update_2b (including) | 8.0-update_2b (including) |
Esxi | Vmware | 8.0-update_2c (including) | 8.0-update_2c (including) |