VMware ESXi Authentication Bypass Vulnerability

CVE-2024-37085

7.2HIGH

Key Information

Vendor
VMware
Status
Vmware Esxi
Vmware Cloud Foundation
Vendor
CVE Published:
25 June 2024
πŸ₯‡ Trended No. 1πŸ“ˆ TrendedπŸ“ˆ Score: 65,200πŸ’° RansomwareπŸ‘Ύ Exploit Exists🟑 Public PoCπŸ¦… CISA ReportedπŸ“° News Worthy

What is CVE-2024-37085?

CVE-2024-37085 is a critical vulnerability in VMware ESXi, a widely used virtualization platform that allows users to run multiple virtual machines on a single physical server. This vulnerability arises from an authentication bypass issue, which permits a malicious actor with adequate Active Directory (AD) permissions to gain unauthorized access to an ESXi host configured for AD user management. If exploited, it can lead to significant security breaches, putting sensitive data and essential services at risk.

Technical Details

The vulnerability exists due to the ability for an attacker to recreate a deleted AD group, typically the 'ESXi Admins' group, that is responsible for managing permissions on the ESXi host. By leveraging sufficient AD permissions, the attacker can bypass authentication mechanisms and effectively assume control of the ESXi host without proper authorization, compromising the integrity and confidentiality of virtual machines running on that host. This adds complexity to the security environment as it intertwines with the configurations and management of Active Directory.

Impact of the Vulnerability

  1. Unauthorized Access: Attackers can gain full administrative control over ESXi hosts, allowing them to manipulate virtual machines and disrupt services without detection.

  2. Data Breach Risk: With administrative privileges, attackers could exfiltrate sensitive data stored within the virtual machines, leading to potential data loss, regulatory violations, and a reputational impact.

  3. Service Disruption: The ability to control ESXi hosts can lead to service outages or interruptions, affecting business operations and availability, which can be devastating for organizations that rely on these virtualized environments for critical processes.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2024-37085 as being exploited and is known by the CISA as enabling ransomware campaigns.

The CISA's recommendation is: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Affected Version(s)

VMware Cloud Foundation 5.x

VMware Cloud Foundation 4.x

VMware ESXi 8.0

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

News Articles

BlackByte Targets ESXi Bug With Ransomware to Access Virtual Assets

The pivot is one of several changes the groups using the malware have used in recent attacks.

4 months ago

+20,000 internet-exposed VMware ESXi instances vulnerable to CVE-2024-37085

Researchers reported that over 20,000 internet-exposed VMware ESXi instances are affected by the actively exploited CVE-2024-37085.

5 months ago

Microsoft Says VMware ESXi Flaw is Being Exploited By Ransomware Groups

The CVE-2024-37085 vulnerability is present in VMware ESXi hypervisors and has been used to deploy ransomware, according to Microsoft.

5 months ago

References

EPSS Score

1% chance of being exploited in the next 30 days.

CVSS V3.1

Score:
7.2
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟑

    Public PoC available

  • πŸ₯‡

    Vulnerability reached the number 1 worldwide trending spot

  • πŸ¦…

    CISA Reported

  • πŸ“ˆ

    Vulnerability started trending

  • πŸ’°

    Used in Ransomware

  • πŸ‘Ύ

    Exploit known to exist

  • πŸ“°

    First article discovered by CybersecurityNews

  • Vulnerability published

  • Vulnerability Reserved

Collectors

NVD DatabaseMitre DatabaseCISA Database1 Proof of Concept(s)18 News Article(s)
.