Overview
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505; https://nvd.nist.gov/vuln/detail/CVE-2024-37085
Key Details
| Property | Value |
|---|---|
| CVE ID | CVE-2024-37085 |
| Vendor / Product | VMware — ESXi |
| NVD Published | 2024-06-25 |
| NVD Last Modified | 2025-10-30 |
| CVSS 3.1 Score | 6.8 |
| CVSS 3.1 Vector | CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H |
| Severity | MEDIUM |
| CWE | CWE-287 |
| CISA KEV Added | 2024-07-30 |
| CISA KEV Deadline | 2024-08-20 |
| Known Ransomware Use | ⚠️ Yes |
CVSS 3.1 Breakdown
Attack Vector
Network
Attack Complexity
Low
Privileges Required
High
User Interaction
Required
Scope
Unchanged
Confidentiality
High
Integrity
High
Availability
High
Required Action
CISA BOD 22-01 Deadline: 2024-08-20.
Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.
Timeline
| Date | Event |
|---|---|
| 2024-07-30 | Added to CISA Known Exploited Vulnerabilities catalog |
| 2024-08-20 | CISA BOD 22-01 remediation deadline |
References
| Resource | Type |
|---|---|
| NVD — CVE-2024-37085 | Vulnerability Database |
| CISA KEV Catalog Entry | US Government |