### [CVE-2024-37081](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-37081) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20Cloud%20Foundation&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=VMware%20vCenter%20Server&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=%3D%205.x%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=8.0%3C%208.0%20U2d%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Local%20privilege%20escalation%20vulnerability&color=brighgreen) ### Description The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance. ### POC #### Reference No PoCs from references. #### Github - https://github.com/CERTologists/Modified-CVE-2024-37081-POC - https://github.com/Mr-r00t11/CVE-2024-37081 - https://github.com/UGF0aWVudF9aZXJv/VMWare-Pentesting - https://github.com/mbadanoiu/CVE-2024-37081 - https://github.com/nomi-sec/PoC-in-GitHub - https://github.com/tanjiti/sec_profile