First published: Tue Jun 25 2024(Updated: )
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi | ||
VMware Cloud Foundation | >=4.0<5.2 | |
VMware ESXi | =7.0 | |
VMware ESXi | =8.0 | |
VMware ESXi | =8.0-a | |
VMware ESXi | =8.0-b | |
VMware ESXi | =8.0-c | |
VMware ESXi | =8.0-update_1 | |
VMware ESXi | =8.0-update_1a | |
VMware ESXi | =8.0-update_1c | |
VMware ESXi | =8.0-update_1d | |
VMware ESXi | =8.0-update_2 | |
VMware ESXi | =8.0-update_2b | |
VMware ESXi | =8.0-update_2c |
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-37085 is classified as a critical severity vulnerability due to its potential for unauthorized access.
To fix CVE-2024-37085, apply the security patch provided by VMware for the affected ESXi versions.
CVE-2024-37085 affects VMware ESXi hosts that are configured to use Active Directory for user management.
Yes, CVE-2024-37085 can be exploited remotely by a malicious actor with sufficient Active Directory permissions.
The impact of CVE-2024-37085 includes unauthorized full access to ESXi hosts, which can lead to data breaches and service disruptions.