7.2

CVE-2024-37085

Warning

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously  configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html  by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

Data is provided by the National Vulnerability Database (NVD)
VMwareCloud Foundation Version >= 4.0 < 5.2
VMwareESXi Version7.0
VMwareESXi Version8.0 Update-
VMwareESXi Version8.0 Updatea
VMwareESXi Version8.0 Updateb
VMwareESXi Version8.0 Updatec
VMwareESXi Version8.0 Updateupdate_1
VMwareESXi Version8.0 Updateupdate_1a
VMwareESXi Version8.0 Updateupdate_1c
VMwareESXi Version8.0 Updateupdate_1d
VMwareESXi Version8.0 Updateupdate_2
VMwareESXi Version8.0 Updateupdate_2b
VMwareESXi Version8.0 Updateupdate_2c

30.07.2024: CISA Known Exploited Vulnerabilities (KEV) Catalog

VMware ESXi Authentication Bypass Vulnerability

Vulnerability

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

Description

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Required actions
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 65.24% 0.984
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.2 1.2 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H
security@vmware.com 6.8 0.9 5.9
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.

CWE-305 Authentication Bypass by Primary Weakness

The authentication algorithm is sound, but the implemented mechanism can be bypassed as the result of a separate weakness that is primary to the authentication error.