Overview
- Description
- VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
- Source
- security@vmware.com
- NVD status
- Analyzed
Risk scores
CVSS 3.1
- Type
- Primary
- Base score
- 7.2
- Impact score
- 5.9
- Exploitability score
- 1.2
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
- Severity
- HIGH
Known exploits
Data from CISA
- Vulnerability name
- VMware ESXi Authentication Bypass Vulnerability
- Exploit added on
- Jul 30, 2024
- Exploit action due
- Aug 20, 2024
- Required action
- Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Social media
- Hype score
- Not currently trending
#Akira #Ransomware DLS is online again. hxxps://akiral2iz6a7qgd3ayp3l6yub7xx2uep76idk3u2kollpj5z3z636bad.onion/ Their favorite vulnerabilities used in different breaches are: CVE-2023-27532, CVE-2024-37085 https://t.co/ep1WtMrFtF
@ShanHolo
11 Nov 2024
541 Impressions
4 Retweets
10 Likes
2 Bookmarks
0 Replies
0 Quotes
🚨 ¡Alerta de seguridad crítica! 🚨 Se ha identificado la vulnerabilidad CVE-2024-37085, que permite omisión de autenticación en Active Directory. 🛡️ Esta brecha podría dar acceso no autorizado a recursos valiosos. ¡Es crucial actuar ahora! 🔧 🔍 Recomienda: Aplicar parches y…
@antu_tech
19 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BC8A0BB4-A21B-4914-8F4B-37D300A4BBB9", "versionEndIncluding": "5.2", "versionStartIncluding": "4.0" }, { "criteria": "cpe:2.3:o:vmware:esxi:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48D2E2D5-A0B8-4AF1-BF4A-30154F754C94" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A1A402A-9262-4B97-A0B7-E5AE045E394D" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE44B379-9943-4DD1-8514-26F87482AFA8" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2A797377-8945-4D75-AA68-A768855E5842" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79D84D76-54BE-49E9-905C-7D65B4B42D68" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2F8767F7-7C3D-457D-9EAC-E8A30796F751" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7781A2CA-D927-48CD-9932-AE42B7BA1EFE" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18FD08C9-5895-4BF4-BBE0-C2DDA5F6B836" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "360C1B71-5360-4379-B0DE-63BB8F5E6DA2" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B16ED7C1-9881-452A-8BE0-EDDEAEFE3D7B" }, { "criteria": "cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ED92209F-FBD6-43F9-9A15-3842B139FCC9" } ], "operator": "OR" } ] } ]