VMware vCenter Server Local Privilege Escalation Vulnerabilities

CVE-2024-37081
7.8HIGH

Key Information

Vendor
VMware
Status
Vmware Vcenter Server
Vmware Cloud Foundation
Vendor
CVE Published:
18 June 2024

Badges

👾 Exploit Exists🔴 Public PoC📰 News Worthy

Summary

The CVE-2024-37081 vulnerability in VMware vCenter Server allows an authenticated local user with non-administrative privileges to elevate privileges to root on the vCenter Server Appliance. This is a local privilege escalation vulnerability due to misconfiguration of sudo. The potential impact of this vulnerability is significant, as it can allow unauthorized elevation of privileges on the vCenter Server. The vendor affected by this vulnerability is VMware. There are no known exploits of this vulnerability by ransomware groups at this time.

Affected Version(s)

VMware vCenter Server < 8.0 U2d

VMware vCenter Server < 7.0 U3r

VMware Cloud Foundation = 5.x

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

CVSS V3.1

Score:
7.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Local
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • First article discovered by www.thehackerwire.com

  • 👾

    Exploit exists.

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre Database1 Proof of Concept(s)1 News Article(s)
.