VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
2024-06-25T15:15:12.377
2024-12-20T16:52:43.217
Analyzed
CVSSv3.1: 6.8 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | vmware | cloud_foundation | < 5.2 | Yes |
Operating System | vmware | esxi | 7.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |
Operating System | vmware | esxi | 8.0 | Yes |