CVE-2024-37086

6.8 MEDIUM

📋 TL;DR

This vulnerability allows a malicious actor with local administrative privileges on a virtual machine with an existing snapshot to trigger an out-of-bounds read in VMware ESXi. This can lead to a denial-of-service condition of the host, affecting ESXi hypervisor environments.

💻 Affected Systems

Products:
  • VMware ESXi
Versions: Specific affected versions not specified in provided references; check vendor advisory for details.
Operating Systems: ESXi hypervisor
Default Config Vulnerable: ⚠️ Yes
Notes: Requires: 1) Local administrative privileges on a virtual machine, 2) An existing snapshot on that VM.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Complete host denial-of-service, disrupting all virtual machines running on the affected ESXi server.

🟠

Likely Case

Host instability or crash requiring manual intervention to restore service.

🟢

If Mitigated

Limited impact due to restricted administrative access and snapshot management controls.

🌐 Internet-Facing: LOW - Requires local administrative access to a virtual machine, not directly exploitable from internet.
🏢 Internal Only: MEDIUM - Internal attackers with VM admin privileges and existing snapshots could disrupt host operations.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires specific preconditions (VM admin + existing snapshot) making exploitation more complex than simple attacks.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Check VMware security advisory for specific patched versions

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505

Restart Required: Yes

Instructions:

1. Review VMware security advisory for affected versions. 2. Download appropriate ESXi patch from VMware. 3. Place host in maintenance mode. 4. Apply patch via vSphere Client or CLI. 5. Reboot host. 6. Verify patch installation.

🔧 Temporary Workarounds

Restrict VM Administrative Access

all

Limit local administrative privileges on virtual machines to trusted users only.

Manage Snapshots Carefully

all

Avoid keeping unnecessary snapshots and implement snapshot lifecycle management.

🧯 If You Can't Patch

  • Implement strict access controls for VM administrative privileges
  • Regularly review and remove unnecessary VM snapshots

🔍 How to Verify

Check if Vulnerable:

Check ESXi version against VMware security advisory for affected versions

Check Version:

esxcli system version get

Verify Fix Applied:

Verify ESXi version matches patched version from VMware advisory

📡 Detection & Monitoring

Log Indicators:

  • Host crash events
  • Unexpected host reboots
  • VM snapshot-related errors

Network Indicators:

  • Sudden loss of connectivity to VMs on affected host

SIEM Query:

Search for ESXi host crash events or unexpected reboots in virtualization logs

🔗 References

📤 Share & Export