Okay, deep breath, let's get this over with. In the grand act of digital self-sabotage, we've littered this site with cookies. Yep, we did that. Why? So your highness can have a 'premium' experience or whatever. These traitorous cookies hide in your browser, eagerly waiting to welcome you back like a guilty dog that's just chewed your favorite shoe. And, if that's not enough, they also tattle on which parts of our sad little corner of the web you obsess over. Feels dirty, doesn't it?
Why Joining VMware ESXi to Active Directory is a Ransomware Invitation
Joining your VMware ESXi hypervisor to Active Directory? Recent Microsoft warnings suggest you rethink that. The CVE-2024-37085 vulnerability could let attackers create AD groups and gain full control of your ESXi hypervisor. Ransomware groups are already exploiting this, so patch up and protect your credentials!

Hot Take:
Well, if you’ve ever thought joining your VMware ESXi hypervisor to Active Directory was like inviting a vampire into your house, congratulations! You’re right. And now there’s a CVE to prove it. So, if you’ve got a love for chaos and ransomware, by all means, keep that door wide open. Otherwise, you might want to patch up and reconsider your life choices.
Key Points:
- CVE-2024-37085 is a newly patched vulnerability affecting VMware ESXi hypervisors joined to Active Directory.
- The vulnerability allows for full admin control of ESXi hypervisors via creation or renaming of an “ESX Admins” AD group.
- Ransomware groups like Black Basta, Akira, Medusa, and Octo Tempest have been actively exploiting this flaw.
- Microsoft and Broadcom have both issued advisories and patches, though criticism abounds on the severity rating.
- Admins are advised to patch immediately and review their AD and ESXi configurations to avoid potential exploits.