CVE CVE

CVE-2024-37085

CISA Known Exploited Vulnerability (KEV)

VMware ESXi Authentication Bypass Vulnerability

July 30, 2024

August 20, 2024

Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Description

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group (‘ESXi Admins’ by default) after it was deleted from AD.

Weakness Enumeration

CWE-ID CWE Name

CWE-287
Improper Authentication

CWE-305
Authentication Bypass by Primary Weakness

Known Affected Software Configurations


cpe:2.3:a:vmware:cloud_foundation:4.5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.5.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:5.1.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:5.2:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_1d:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_2b:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:update_2c:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:5.0:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10:-:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.11:-:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.3.11:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.5:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.4.1.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.4.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.4:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.11.0.1:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.11:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.0:-:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.0:-:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.3.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10.2.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.1.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.2.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10.2.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10.1.2:*:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*

cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10.1.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.10:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.9.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.9:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.8.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.8:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.7.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.7.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.7:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.5.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.0.1.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:3.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.7:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.6:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.5:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.4:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.3.0:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.2.1.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.2.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.2.0.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.2.0.1:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.2:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.1.3c:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.1.3b:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.1.3a:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:2.1.3:*:*:*:*:*:*:*

cpe:2.3:a:vmware:cloud_foundation:-:*:*:*:*:*:*:*

Details

Source:
NVD
Published:
Updated:

Risk information

CVSS v3

Base score:
7.2
Severity:

HIGH

Vector:
CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H

CVSS v2

Not defined