VMware vCenter Server Local Privilege Escalation Vulnerabilities
Key Information
- Vendor
- VMware
- Status
- Vmware Vcenter Server
- Vmware Cloud Foundation
- Vendor
- CVE Published:
- 18 June 2024
Badges
Summary
The CVE-2024-37081 vulnerability in VMware vCenter Server allows an authenticated local user with non-administrative privileges to elevate privileges to root on the vCenter Server Appliance. This is a local privilege escalation vulnerability due to misconfiguration of sudo. The potential impact of this vulnerability is significant, as it can allow unauthorized elevation of privileges on the vCenter Server. The vendor affected by this vulnerability is VMware. There are no known exploits of this vulnerability by ransomware groups at this time.
Affected Version(s)
VMware vCenter Server < 8.0 U2d
VMware vCenter Server < 7.0 U3r
VMware Cloud Foundation = 5.x
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
News Articles
CVSS V3.1
Timeline
First article discovered by www.thehackerwire.com
- 👾
Exploit exists.
Vulnerability published.
Vulnerability Reserved.