Privileged Session Hijacking Vulnerability in VMware Enhanced Authentication Plug-in
CVE-2024-22250

7.8HIGH

Key Information:

Vendor
Vmware
Vendor
CVE Published:
20 February 2024

Badges

📰 News Worthy

Summary

The vulnerability exists in the Deprecated VMware Enhanced Authentication Plug-in, where a session hijack can occur. This allows a malicious actor with unprivileged local access to a Windows operating system to hijack a privileged EAP session initiated by a privileged domain user on the same system. This vulnerability poses significant risks, as it can lead to unauthorized access to sensitive operations or data within the affected environment, highlighting the urgent need for remediation to protect user sessions.

Affected Version(s)

VMware Enhanced Authentication Plug-in (EAP) Windows All

News Articles

VMware issues no-patch advisory for critical flaw in old SSO plugin

The VMware Enhanced Authentication Plug-in risks authentication relay and session hijacking.

11 months ago

VMware pushes admins to uninstall vulnerable, deprecated vSphere plugin (CVE-2024-22245, CVE-2024-22250) - Help Net Security

Vulnerabilities in VMware EAP (CVE-2024-22245, CVE-2024-22250) can be exploited for authentication relay and session hijack attacks.

11 months ago

VMware Urges to Remove Enhanced EAP Plugin to Stop Auth & Session Hijack Attacks

VMware has issued an urgent advisory to administrators to remove a deprecated authentication plugin vulnerable to severe security threats.

11 months ago

References

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
Low
User Interaction:
None
Scope:
Changed

Timeline

  • 📰

    First article discovered by Beeping Computers

  • Vulnerability published

  • Vulnerability Reserved

.