CVE-2024-37085
high-risk
Published 2024-06-25
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Do I need to act?
!
71.9% chance of exploitation in next 30 days
EPSS score — higher than 28% of all CVEs
!
CISA KEV: actively exploited in the wild
On the Known Exploited Vulnerabilities catalog — federal agencies must patch
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
6
CVSS 6.8/10
Medium
NETWORK
/ LOW complexity
Affected Vendors
References (3)
68
/ 100
high-risk
Severity
25/34 · High
Exploitability
26/34 · High
Exposure
17/34 · Moderate