Cythera Cyber Security

Broadcom VMware Hypervisor Vulnerability CVE-2024-37085 - Exploited In The Wild By Ransomware Crews

A vulnerability has been found in domain-joined ESXi Hypervisors which provides a domain group's users with full administrative access to the Hypervisor without proper validation.
Talk to an expert

Broadcom VMware Hypervisor Vulnerability

CVE: CVE-2024-37085


What Is Vulnerable?

  • Broadcom VMware ESXi
  • VMware Cloud Foundation

The following VMWare products and versions are vulnerable to CVE-2024-37085:
  • VMware ESXi 8.0 (fixed in ESXi80U3-24022510)
  • VMware ESXi 7.0 (no patch planned)
  • VMware Cloud Foundation 5.x (fixed in 5.2)
  • VMware Cloud Foundation 4.x (no patch planned)

What is Happening?

A vulnerability has been found in domain-joined ESXi Hypervisors which provides a domain group's users with full administrative access to the Hypervisor without proper validation.
Researchers have found that when VMware ESXi hypervisors are joined to an Active Directory domain all members of the domain group are by default given full administrative access if the group is labelled "ESXi Admins".
This group doesn't exist by default and the hypervisor doesn't validate when the server is joined to the domain for its existence either.
Malicious actors are using access to a privileged account to create the domain group and add users to the ESXi Admin group to gain full administrative access to the Hypervisor.

Key Facts

  • There is evidence of this vulnerability has been exploited in many Ransomware attacks.
  • This isn't used as an initial point of entry for malicious attackers as they require access to a privileged account to make the domain group changes.
  • Updates to remediate the vulnerability have been issued by VMware for some versions.

What you can do?

  • Apply the security patches provided by VMware for ESXi and VMware Cloud Foundation for affected versions that have a planned patch
  • VMware ESXi 7.0 and VMware Cloud Foundation 4.x don't have patches so settings changes are required to prevent exploitation. Broadcom has provided information on how to harden the device. Broadcom recommends, if possible, to update your hypervisor to a patched version - knowledge.broadcom.com 
  • Administrators who are unable to update should implement workaround recommendations in the interim.

Additionally, you can assess your domain groups for group name "ESXi Admins" and remove the group if not created for legitimate purposes.

Look for new (suspicious) users being created, or other configuration keys being tampered with.

Cythera is actively monitoring for this activity for managed detection and response clients 

Cythera is committed to protecting our customers from cyber threats and ensuring their business continuity. If you have any questions or concerns about this or any other cybersecurity issue, please contact us


Events

Latest events

Join Cythera experts for networking events, technical briefings, and hands-on workshops hosted throughout the year.
View all events
No items found.
Cyber security news

Latest advisories

Stay ahead of emerging threats with our expert blog posts, research, and industry updates.
Silverstripe - Host Header Injection
Silverstripe CMS is affected by a Host Header Injection flaw, which can be exploited to manipulate password reset workflows, potentially redirecting or compromising user data.
FarCry Core Framework - Multiple Issues
FarCry Core contains multiple vulnerabilities that could let unauthenticated users upload arbitrary files and execute remote code on the hosting server.
Silverstripe – Cross-Site Scripting (XSS) Vulnerability
With local organisation admin credentials, an attacker can exploit the API to create, delete, or revert virtual machine snapshots in other organisations’ Virtual Data Centres (VDCs), breaching isolation boundaries.