CVE-2024-37085
EUVD-2024-3641625.06.2024, 15:15
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.EnginsightAffected Products (NVD)
| Vendor | Product | Version |
|---|---|---|
| vmware | cloud_foundation | 4.0 ≤ 𝑥 < 5.2 |
| vmware | esxi | 7.0 |
| vmware | esxi | 8.0 |
| vmware | esxi | 8.0:a |
| vmware | esxi | 8.0:b |
| vmware | esxi | 8.0:c |
| vmware | esxi | 8.0:update_1 |
| vmware | esxi | 8.0:update_1a |
| vmware | esxi | 8.0:update_1c |
| vmware | esxi | 8.0:update_1d |
| vmware | esxi | 8.0:update_2 |
| vmware | esxi | 8.0:update_2b |
| vmware | esxi | 8.0:update_2c |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-287 - Improper AuthenticationWhen an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.
- CWE-305 - Authentication Bypass by Primary WeaknessThe authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.
References