### [CVE-2024-22275](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22275) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation%20(vCenter%20Server)&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=5.x%3C%205.1.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0%3C%208.0%20U2b%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Partial%20file%20read%20vulnerability&color=brighgreen) ### Description The vCenter Server contains a partial file read vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to partially read arbitrary files containing sensitive data. ### POC #### Reference No PoCs from references. #### Github - https://github.com/mbadanoiu/CVE-2024-22275 - https://github.com/nomi-sec/PoC-in-GitHub