TLP : CLEAR
Date : 30/07/2024
REF NO : CERT / 2024/07/67
Severity Level: Medium
Components Affected
Overview
Multiple vulnerabilities were identified in VMware products. An attacker could exploit some of these vulnerabilities to trigger denial of service and security restriction bypass.
Note:
CVE-2024-37085 is being exploited in the wild, therefore, the risk level is rated as medium. It is related a domain group whose members are granted full administrative access to the ESXi hypervisor by default without proper validation.
Description
VMware ESXi and vCenter Server are affected by several critical vulnerabilities that could lead to severe security risks. In ESXi, an authentication bypass vulnerability allows a malicious actor with sufficient Active Directory (AD) permissions to gain full access to an ESXi host by re-creating a previously deleted AD group (‘ESXi Admins’ by default). Additionally, ESXi has an out-of-bounds read vulnerability where a malicious actor with local administrative privileges on a virtual machine with an existing snapshot could trigger a denial-of-service condition on the host. Furthermore, vCenter Server is vulnerable to a denial-of-service attack, where a malicious actor with network access could create a denial-of-service condition, potentially disrupting services.
Impact
Solution/ Workarounds
Before installation of the software, please visit the vendor web-site for more details.
Reference
Disclaimer : The information provided herein is on an “as is” basis, without warranty of any kind.
Sri Lanka Computer Emergency Readiness Team | Coordination Centre