VMware ESXi Compromise Threatens Guest VM Security

CVE-2023-20867
3.9LOW

Key Information

Vendor
VMware
Status
VMware Tools
Vendor
CVE Published:
13 June 2023

Badges

😄 Trended👾 Exploit Exists📰 News Worthy

Summary

The VMware ESXi vulnerability CVE-2023-20867 is being actively exploited by a Chinese cyberespionage group known as UNC3886. The vulnerability allows the attacker to execute commands and transfer files to and from guest virtual machines from a compromised ESXi host without the need for guest credentials. This exploitation threatens the confidentiality and integrity of the guest VMs. The group is also deploying custom backdoors on compromised targets. The vendor, VMware, has patched the vulnerability; however, this case highlights the importance of timely patching and security vigilance in protecting against advanced cyber threats.

CISA Reported

CISA provides regional cyber and physical services to support security and resilience across the United States. CISA monitor the most dangerious vulnerabilities and have identifed CVE-2023-20867 as being exploited but is not known by the CISA to be used in ransomware campaigns. This is subject to change at pace as recent news articles suggest the vulnerability is being used by ransomware groups.

The CISA's recommendation is: Apply updates per vendor instructions.

Affected Version(s)

VMware Tools >= 12.2.5

News Articles

CVSS V3.1

Score:
3.9
Severity:
LOW
Confidentiality:
Low
Integrity:
Low
Availability:
None
Attack Vector:
Local
Attack Complexity:
High
Privileges Required:
High
User Interaction:
None
Scope:
Changed

Timeline

  • Vulnerability started trending.

  • 👾

    Exploit exists.

  • First article discovered by TechTarget

  • Vulnerability published.

  • Vulnerability Reserved.

Collectors

NVD DatabaseMitre DatabaseCISA Database8 News Article(s)
.