SB2024022050 - Multiple vulnerabilities in VMware Enhanced Authentication Plug-in (EAP)



SB2024022050 - Multiple vulnerabilities in VMware Enhanced Authentication Plug-in (EAP)

Published: February 20, 2024 Updated: September 4, 2024

Security Bulletin ID SB2024022050
Severity
High
Patch available
NO
Number of vulnerabilities 2
Exploitation vector Remote access
Highest impact Data manipulation

Breakdown by Severity

High 50% Low 50%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 2 secuirty vulnerabilities.


1) Authentication bypass by capture-replay (CVE-ID: CVE-2024-22245)

The vulnerability allows a remote attacker to compromise the affected system.

The vulnerability exists due to arbitrary authentication relay issue. A remote attacker trick a target domain user with EAP installed in their web browser into requesting and relaying service tickets for arbitrary Active Directory Service Principal Names (SPNs).


2) Permissions, Privileges, and Access Controls (CVE-ID: CVE-2024-22250)

The vulnerability allows a local user to hijack victim's session.

The vulnerability exists due to the way EAP initiates and handles sessions with the AD. A local user can hijack a privileged EAP session when initiated by a privileged domain user on the same system.

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.