CVE-2024-37085

EUVD-2024-36416
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously  configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html  by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
6.8 MEDIUM
NETWORK
LOW
HIGH
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Base Score
CVSS 3.x
EPSS Score
Percentile: 98%
Affected Products (NVD)
VendorProductVersion
vmwarecloud_foundation
4.0 ≤
𝑥
< 5.2
vmwareesxi
7.0
vmwareesxi
8.0
vmwareesxi
8.0:a
vmwareesxi
8.0:b
vmwareesxi
8.0:c
vmwareesxi
8.0:update_1
vmwareesxi
8.0:update_1a
vmwareesxi
8.0:update_1c
vmwareesxi
8.0:update_1d
vmwareesxi
8.0:update_2
vmwareesxi
8.0:update_2b
vmwareesxi
8.0:update_2c
𝑥
= Vulnerable software versions
Early Detection
Affected products identified ahead of NVD analysis through intelligence sources.
VendorProductVersionSource
vmwarecloud_foundation
5.0 ≤
𝑥
< 5.2
ADP
vmwarecloud_foundation
4.0 ≤
𝑥
< 5.0
ADP
vmwareesxi
8.0 ≤
𝑥
< ESXi80U3-24022510
ADP