VMware vCenter Server Local Privilege Escalation Vulnerabilities
CVE-2024-37081
Key Information:
- Vendor
- VMware
- Vendor
- CVE Published:
- 18 June 2024
Badges
Summary
The CVE-2024-37081 vulnerability in VMware vCenter Server allows an authenticated local user with non-administrative privileges to elevate privileges to root on the vCenter Server Appliance. This is a local privilege escalation vulnerability due to misconfiguration of sudo. The potential impact of this vulnerability is significant, as it can allow unauthorized elevation of privileges on the vCenter Server. The vendor affected by this vulnerability is VMware. There are no known exploits of this vulnerability by ransomware groups at this time.
Affected Version(s)
VMware Cloud Foundation 5.x
VMware Cloud Foundation 4.x
VMware vCenter Server 8.0 < 8.0 U2d
Exploit Proof of Concept (PoC)
PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.
Get notified when SecurityVulnerability.io launches alerting π
Well keep you posted π§
News Articles
CVE-2024-37081
We believe that knowledge is the ultimate weapon against cyber threats. By breaking down complex concepts, democratizing technical expertise, and fostering a dialogue around cybersecurity, TheHackerWire...
6 months ago
References
CVSS V3.1
Timeline
- π°
First article discovered by www.thehackerwire.com
- π‘
Public PoC available
- πΎ
Exploit known to exist
Vulnerability published
Vulnerability Reserved