Arbitrary Authentication Relay and Session Hijack Vulnerabilities in VMware EAP
CVE-2024-22245

9.6CRITICAL

Key Information:

Vendor
Vmware
Vendor
CVE Published:
20 February 2024

Badges

📈 Trended📈 Score: 5,330👾 Exploit Exists📰 News Worthy

What is CVE-2024-22245?

CVE-2024-22245 is a critical vulnerability affecting the deprecated VMware Enhanced Authentication Plug-in (EAP). This plugin is designed to enhance security measures within VMware environments by providing additional authentication mechanisms. The vulnerability allows malicious actors to exploit arbitrary authentication relay and session hijacking, potentially compromising an organization’s security. By tricking a target user, an attacker can hijack their authentication process, thereby gaining unauthorized access to sensitive resources within an Active Directory environment. This could result in severe operational disruptions, data breaches, and unauthorized control over systems.

Technical Details

The vulnerability arises from flaws in the EAP that enable a malicious user to manipulate service ticket requests. Specifically, attackers can trick a domain user with the EAP installed on their web browser into requesting and subsequently relaying service tickets for arbitrary Service Principal Names (SPNs). This can lead to unauthorized access to resources, as the attacker can effectively pose as a legitimate user within the affected environment. Given the full integration of EAP within VMware’s infrastructure, this vulnerability can potentially affect various services and operations that rely on Active Directory authentication.

Impact of the Vulnerability

  1. Unauthorized Access: The primary impact of CVE-2024-22245 is the ability for an attacker to gain unauthorized access to sensitive resources within an organization’s network. This can lead to data theft, manipulation of sensitive information, and unauthorized transactions.

  2. Compromise of Active Directory Security: The vulnerability can significantly weaken the security of Active Directory implementations, allowing attackers to bypass established authentication mechanisms. This compromises the integrity of user permissions and can facilitate further exploitation within the network.

  3. Potential Operational Disruption: Exploitation of this vulnerability can lead to service disruptions, system compromise, and a high likelihood of operational downtime. Organizations may face substantial challenges in remediation efforts and restoring services, resulting in financial and reputational damage.

Affected Version(s)

VMware Enhanced Authentication Plug-in (EAP) Windows All

News Articles

VMware issues no-patch advisory for critical flaw in old SSO plugin

The VMware Enhanced Authentication Plug-in risks authentication relay and session hijacking.

11 months ago

Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP (CVE-2024-1597, CVE-2024-22245)

Critical Vulnerabilities in ConnectWise ScreenConnect, PostgreSQL JDBC, and VMware EAP (CVE-2024-1597, CVE-2024-22245) ConnectWise has addressed a CVSS 10 vulnerability in its ScreenConnect product, a desktop and mobile …

11 months ago

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250) - Help Net Security

Vulnerabilities in VMware EAP (CVE-2024-22245, CVE-2024-22250) can be exploited for authentication relay and session hijack attacks.

11 months ago

References

CVSS V3.1

Score:
9.6
Severity:
CRITICAL
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
Required
Scope:
Changed

Timeline

  • 👾

    Exploit known to exist

  • 📈

    Vulnerability started trending

  • 📰

    First article discovered by Beeping Computers

  • Vulnerability published

  • Vulnerability Reserved

.