CVE-2024-22250
CVE-2024-22250: Session Hijack vulnerability in VMware Enhanced Authentication Plug-in. A malicious local user can hijack a privileged session. This vulnerability, though having a CVSS score of 0, poses a risk if exploited.
CVE-2024-22250 allows a local attacker with unprivileged access on a Windows system to hijack a privileged EAP session initiated by a domain user. The VMware Enhanced Authentication Plug-in is the affected component. SOCRadar's Vulnerability Risk Score (SVRS) is 30, indicating a moderate risk; while not critical, monitoring is advised. The risk involves unauthorized access to sensitive data and system compromise. This vulnerability is significant because it allows lateral movement within a network from a low-privilege account. Given the CWE-384 (Session Fixation), proper session management is crucial to mitigate risks.
Description
CVE-2024-22250 is a Session Hijack vulnerability in the Deprecated VMware Enhanced Authentication Plug-in. It allows a malicious actor with unprivileged local access to a Windows operating system to hijack a privileged EAP session when initiated by a privileged domain user on the same system. The SVRS for this CVE is 0, indicating a low level of urgency and severity.
Key Insights
- This vulnerability can be exploited by an attacker with local access to a Windows system.
- The attacker can hijack a privileged EAP session, allowing them to gain access to sensitive information or perform malicious actions.
- The vulnerability is not actively exploited in the wild, but it is important to patch affected systems as soon as possible.
Mitigation Strategies
- Update to the latest version of VMware Enhanced Authentication Plug-in.
- Disable the Enhanced Authentication Plug-in if it is not required.
- Implement network segmentation to limit the attacker's ability to access privileged EAP sessions.
- Monitor for suspicious activity and investigate any unauthorized access attempts.
Additional Information
- There are no known threat actors or APT groups actively exploiting this vulnerability.
- CISA has not issued a warning for this vulnerability.
- If users have additional queries regarding this incident, they can use the 'Ask to Analyst' feature, contact SOCRadar directly, or open a support ticket for more information if necessary.
Indicators of Compromise
Exploits
News
Social Media
Affected Software
References
CWE Details
CVE Radar
Real-time CVE Intelligence & Vulnerability Management Platform
CVE Radar provides comprehensive vulnerability intelligence by monitoring CVE databases, security advisories, and threat feeds. Get instant updates on new vulnerabilities, exploit details, and mitigation strategies specific to your assets.