Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2024-37085

CVSS 6.8 · Medium KEV · Ransomware EPSS 75.13% · P99
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2024-37085

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Description
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Source: NVD (National Vulnerability Database)
CVSS Information
CVSS:3.1/AV:N/AC:L/PR:H/UI:R/S:U/C:H/I:H/A:H
Source: NVD (National Vulnerability Database)
Vulnerability Type
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Title
VMware ESXi 安全漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
VMware ESXi是美国威睿(VMware)公司的一套可直接安装在物理服务器上的服务器虚拟化平台。 VMware ESXi存在安全漏洞,该漏洞源于存在身份验证绕过漏洞,导致攻击者可获得对之前配置的ESXi主机的完全访问权限。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Shenlong Deep Dive — AI Deep Analysis

10-question deep dive: root cause, exploitation, mitigation, urgency. Read summary free, full version requires login.

Affected Products

VendorProductAffected VersionsCPESubscribe
-VMware ESXi 8.0 ~ ESXi80U3-24022510 -
-VMware Cloud Foundation 5.x -

II. Public POCs for CVE-2024-37085

#POC DescriptionSource LinkShenlong Link
1Vulnerability Scanner for CVE-2024-37085 and Exploits ( For Educational Purpose only)https://github.com/mahmutaymahmutay/CVE-2024-37085POC Details
2CVE-2024-37085 VMware ESXi RCE Vulnerabilityhttps://github.com/Florian-Hoth/CVE-2024-37085-RCE-POCPOC Details
3CVE-2024-37085 unauthenticated shell upload to full administrator on domain-joined esxi hypervisors.https://github.com/WTN-arny/Vmware-ESXIPOC Details
4Nonehttps://github.com/WTN-arny/CVE-2024-37085POC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2024-37085

登录查看更多情报信息。

Same Patch Batch · n/a · 2024-06-25 · 17 CVEs total

CVE-2024-370866.8 MEDIUMVMware ESXi 安全漏洞
CVE-2024-370875.3 MEDIUMVMware vCenter Server 安全漏洞
CVE-2024-38952PX4 Drone Autopilot 安全漏洞
CVE-2024-38951PX4 Drone Autopilot 安全漏洞
CVE-2024-35527FarCry Core Framework 安全漏洞
CVE-2024-35526FarCry Core Framework 安全漏洞
CVE-2024-30931Emby 安全漏洞
CVE-2024-21739Geehy APM32 安全漏洞
CVE-2024-21741GigaDevice GD32E103C8T6 安全漏洞
CVE-2024-21740Artery AT32F415CBT7和AT32F421C8T7 安全漏洞
CVE-2024-37843CraftCMS 安全漏洞
CVE-2024-37855Nepstech Router 安全漏洞
CVE-2024-37742Safe Exam Browser 安全漏洞
CVE-2024-37820PingCAP TiDB 安全漏洞
CVE-2024-36819MAPOS 安全漏洞
CVE-2024-34400Boa和Web 安全漏洞

IV. Related Vulnerabilities

V. Comments for CVE-2024-37085

No comments yet


Leave a comment