Imechapishwa: Aug 16, 2024 18:59
Advisory No: TZCERT-SA-24-0014
Source: VMware ESXi 7.0, 8.0
Software Affected: VMware ESXi 7.0, 8.0
VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
Microsoft has uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors. ESXi is a bare-metal hypervisor that is installed directly onto a physical server and provides direct access and control of underlying resources. ESXi hypervisors host virtual machines that may include critical servers in a network. In a ransomware attack, having full administrative permission on an ESXi hypervisor can mean that the threat actor can encrypt the file system, which may affect the ability of the hosted servers to run and function. It also allows the threat actor to access hosted VMs and possibly to exfiltrate data or move laterally within the network.
Successful exploitation of this vulnerability may allow a remote attacker to take control of the affected system and can encrypt the file system.
Users and administrators of affected product versions are advised to update to the latest version immediately
A digest of Tanzania Computer Emergency Response Team coverage of cyber-security news across the globe.