get a quote
CVE-2024-45612 – Authentication Bypass in VMware vCenter Leading to Full Admin Access

A newly disclosed vulnerability, CVE-2024-45612, has sent shockwaves through enterprises relying on VMware vCenter for virtualization management. This flaw allows an attacker to bypass authentication entirely and gain full administrative control over the vCenter environment. The vulnerability resides in the authentication mechanism of the vCenter Server, where improper validation of SAML tokens enables attackers to craft malicious tokens and trick the system into granting elevated privileges. Exploitation requires network access to the vCenter API, making exposed instances on the internet prime targets for threat actors. Once an attacker gains control, the impact is devastating—complete access to all virtual machines, snapshots, and configurations, which can lead to ransomware deployment or lateral movement into corporate networks. VMware has released patches, urging immediate upgrades, but reports already show scanning and exploitation attempts in the wild. If patching is delayed, administrators should isolate vCenter from external networks and enforce strict API access controls. This CVE reinforces why zero trust and token validation hardening should be priorities in all enterprise-grade systems.