Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-485m-923f-95wx

Опубликовано: 25 июн. 2024
Источник: github
Github: Не прошло ревью
CVSS3: 6.8

Описание

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

EPSS

Процентиль: 99%
0.75699
Высокий

6.8 Medium

CVSS3

Дефекты

CWE-287
CWE-305

Связанные уязвимости

CVSS3: 6.8
nvd
больше 1 года назад

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

CVSS3: 6.8
fstec
больше 1 года назад

Уязвимость гипервизора VMware ESXi, связанная с недостатками процедуры аутентификации, позволяющая нарушителю обойти процедуру аутентификации

EPSS

Процентиль: 99%
0.75699
Высокий

6.8 Medium

CVSS3

Дефекты

CWE-287
CWE-305