CVE-2024-37085

high-risk
Published 2024-06-25

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

Do I need to act?

!
71.9% chance of exploitation in next 30 days
EPSS score — higher than 28% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.8/10 Medium
NETWORK / LOW complexity

Affected Vendors

68
/ 100
high-risk
Severity 25/34 · High
Exploitability 26/34 · High
Exposure 17/34 · Moderate