The U.S. Cybersecurity and Infrastructure Security Agency (CISA)\u00a0added<\/a> an authentication bypass VMware ESXi vulnerability, tracked as CVE-2024-37085<\/a> (CVSS score of 6.8), to its Known Exploited Vulnerabilities (KEV) catalog<\/a>.<\/p>\n\n\n\n
\u201cMicrosoft researchers have uncovered a vulnerability in ESXi hypervisors being exploited by several ransomware operators to obtain full administrative permissions on domain-joined ESXi hypervisors.\u201d warned<\/a> Microsoft.<\/em><\/p>\n\n\n\n
The flaw is an authentication bypass vulnerability in VMware ESXi.<\/p>\n\n\n\n
\u201cA malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously <\/strong>configured to use AD for user management<\/a> <\/strong>by re-creating the configured AD group (\u2018ESXi Admins\u2019 by default) after it was deleted from AD.\u201d reads the advisory<\/strong><\/a> published by the virtualization giant.<\/em><\/p>\n\n\n\n
\u201cMicrosoft security researchers identified a new post-compromise technique utilized by ransomware operators like Storm-0506, Storm-1175,\u00a0Octo Tempest<\/a>, and\u00a0Manatee Tempest<\/a>\u00a0in numerous attacks.\u201d continues Microsoft. \u201cIn several cases, the use of this technique has led to\u00a0Akira<\/a>\u00a0and\u00a0Black Basta<\/a>\u00a0ransomware deployments.\u00a0\u201c<\/em>
According to\u00a0Binding Operational Directive (BOD) 22-01: Reducing the Significant Risk of Known Exploited Vulnerabilities<\/a>, FCEB agencies have to address the identified vulnerabilities by the due date to protect their networks against attacks exploiting the flaws in the catalog.
Experts recommend also private organizations review the\u00a0Catalog<\/a>\u00a0and address the vulnerabilities in their infrastructure.<\/p>\n\n\n\n
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/strong><\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, US CISA Known Exploited Vulnerabilities catalog)<\/strong><\/p>\n","protected":false},"excerpt":{"rendered":"