Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2024-37085: Authentication bypass vulnerability in VMware ESXi

0
Medium
VulnerabilityCVE-2024-37085cvecve-2024-37085
Published: Tue Jun 25 2024 (06/25/2024, 14:16:01 UTC)
Source: CVE Database V5
Product: VMware ESXi

Description

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

AI-Powered Analysis

AILast updated: 10/21/2025, 19:42:32 UTC

Technical Analysis

CVE-2024-37085 is an authentication bypass vulnerability affecting VMware ESXi versions 7.0 and 8.0. The vulnerability arises when ESXi hosts are configured to use Active Directory (AD) for user management, a common practice to centralize authentication and authorization. The default AD group used by ESXi for administrative access is 'ESXi Admins'. An attacker with sufficient permissions in AD can exploit this vulnerability by deleting the configured AD group and then re-creating it. Because ESXi trusts the AD group membership for granting administrative access, re-creating the group allows the attacker to regain or escalate privileges on the ESXi host without proper authentication. This bypass effectively grants full control over the ESXi host, impacting confidentiality, integrity, and availability of the virtualized environment. The vulnerability is categorized under CWE-305 (Authentication Bypass by Primary Weakness). The CVSS 3.1 base score is 6.8, reflecting a medium severity with network attack vector, low attack complexity, high privileges required, and user interaction needed. No public exploits have been reported yet, but the vulnerability poses a significant risk due to the critical role of ESXi in enterprise virtualization infrastructure. The attack requires high-level AD permissions, which limits the attack surface but also underscores the importance of securing AD group management. The lack of available patches at the time of publication necessitates immediate mitigation through administrative controls and monitoring.

Potential Impact

For European organizations, this vulnerability poses a significant risk to virtualized infrastructure security, especially in sectors heavily reliant on VMware ESXi for critical workloads such as finance, healthcare, government, and telecommunications. Successful exploitation can lead to full compromise of ESXi hosts, enabling attackers to manipulate virtual machines, steal sensitive data, disrupt services, or deploy further malware within the environment. The dependency on Active Directory integration means organizations with extensive AD use for access control are particularly vulnerable. Given the widespread adoption of VMware ESXi in Europe, the potential impact includes operational disruption, data breaches, and loss of trust. The requirement for high AD privileges somewhat limits the threat to insiders or attackers who have already compromised AD accounts, but the consequences remain severe. The vulnerability also raises concerns about the security of trust relationships between AD and virtualization platforms, which are common in European enterprises. Without timely mitigation, attackers could leverage this flaw to bypass authentication controls and gain persistent administrative access.

Mitigation Recommendations

European organizations should immediately review and restrict permissions related to AD group management, ensuring that only highly trusted administrators can create, delete, or modify groups like 'ESXi Admins'. Implement strict monitoring and alerting for changes to critical AD groups associated with ESXi access. Enforce multi-factor authentication (MFA) for AD administrative accounts to reduce the risk of credential compromise. Segment and isolate ESXi management networks to limit exposure. Until VMware releases an official patch, consider temporarily disabling AD integration for ESXi hosts where feasible or using local ESXi accounts with strong passwords as a fallback. Conduct regular audits of AD group memberships and ESXi host access logs to detect suspicious activity. Prepare incident response plans specifically addressing potential ESXi host compromises. Stay informed on VMware advisories for patch availability and apply updates promptly once released. Additionally, implement least privilege principles across AD and ESXi environments to minimize the impact of any single compromised account.

Need more detailed analysis?Get Pro

Technical Details

Data Version
5.1
Assigner Short Name
vmware
Date Reserved
2024-06-03T05:40:17.632Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 68f7d9b2247d717aace26a2d

Added to database: 10/21/2025, 7:06:26 PM

Last enriched: 10/21/2025, 7:42:32 PM

Last updated: 10/30/2025, 12:02:18 AM

Views: 4

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats