GNU social JP
  • FAQ
  • Login
GNU social JPは日本のGNU socialサーバーです。
Usage/ToS/admin/test/Pleroma FE
  • Public

    • Public
    • Network
    • Groups
    • Featured
    • Popular
    • People

Conversation

Notices

  1. Embed this notice
    Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 04-Mar-2025 23:19:45 JST Kevin Beaumont Kevin Beaumont

    3 different VMware zero days, under active exploitation by ransomware groups

    CVE-2025-22224, CVE-2025-22225, CVE-2025-22226

    VMware ESXi
    VMware Workstation Pro / Player (Workstation)
    VMware Fusion
    VMware Cloud Foundation
    VMware Telco Cloud Platform

    (Exploitation actually ESXi)

    https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25390

    In conversation about 4 months ago from cyberplace.social permalink

    Attachments

    1. No result found on File_thumbnail lookup.
      Support Content Notification - Support Portal - Broadcom support portal
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 04-Mar-2025 23:21:04 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Unclear if related to this post from a few weeks ago.

      In conversation about 4 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/104/601/737/076/516/original/965ce6e6e8b38b90.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 04-Mar-2025 23:23:17 JST Kevin Beaumont Kevin Beaumont
      in reply to

      You may want to escalate patching this as it allows virtual machine to hypervisor escape - e.g. from some dumb VM to the whole VMware private cloud estate.

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Tuesday, 04-Mar-2025 23:34:10 JST Kevin Beaumont Kevin Beaumont
      in reply to

      VMware have set the Attack Vector to Local, which brings down the CVSS score - but you don't need to be locally at a VM to do the attack, you can do it over the internet if you have access to any VM.

      If you change it to Network, you get 10

      In conversation about 4 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/104/648/505/585/867/original/71cf2511fe58a5c5.png

      2. https://cyberplace.social/system/media_attachments/files/114/104/652/793/881/812/original/a67dbde655b57553.png
    • Embed this notice
      Klaus Frank (agowa338@chaos.social)'s status on Tuesday, 04-Mar-2025 23:41:11 JST Klaus Frank Klaus Frank
      in reply to

      @GossiTheDog What exactly do you mean with "you can do it over the internet if you have access to any VM".

      Do you mean there needs to be an attacker service running on the VM or that just having a service like a webserver running inside such a VM is enough? (As long as said webserver is accessible from external).

      Also to what extend would such a service have to be compromised first?

      In conversation about 4 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 05-Mar-2025 01:14:58 JST Kevin Beaumont Kevin Beaumont
      in reply to

      VMware ESXi vulns added to CISA KEV.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/105/000/093/076/449/original/a3f4f4f2c2ac43d7.png
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 05-Mar-2025 02:41:48 JST Kevin Beaumont Kevin Beaumont
      in reply to
      • Tom Sellers

      Good catch by @TomSellers - although VMware doesn't list ESXi 6.7 as vulnerable, it is - they've published a patch for it: https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/6-7/release-notes/esxi-update-and-patch-release-notes/vmware-esxi-67-patch-release-esxi670202503001.html

      I think what's happening here is 6.7 is under premium (paid) extended support where they publish patches for high severity vulns.

      This also tends to indicate it applies to other unsupported versions. The forum post suggested that vuln worked on ESXi 5.x - no patch is available that far back.

      I think this may be a big problem for many orgs.

      In conversation about 3 months ago permalink

      Attachments


    • Embed this notice
      Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 05-Mar-2025 02:46:29 JST Tom Sellers Tom Sellers
      in reply to

      @GossiTheDog

      In the Github version of the advisory and FAQ they actually state that ALL unpatched versions are vulnerable though they indicate that they haven't tested most unsupported versions. Here are few snippets from the link below:

      You are affected if you are running any version of VMware ESX, VMware vSphere, VMware Cloud Foundation, or VMware Telco Cloud Platform prior to the versions listed as “fixed” in the VMSA.

      For a definitive list of affected versions, please refer to the VMSA directly. If there is any uncertainty about whether a system is affected, it should be presumed vulnerable, and immediate action should be taken.

      Does this impact VMware vSphere 6.5 or 6.7?

      Yes. A patch has been released for ESX 6.7 and is available via the Support Portal to all customers. ESX 6.5 customers should use the extended support process for access to ESX 6.5 patches.

      Products that are past their End of General Support dates are not evaluated as part of security advisories, and are not listed in the official VMSA. Broadcom strongly encourages all customers using vSphere 6.5 and 6.7 to update to vSphere 8.

      https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 05-Mar-2025 02:52:00 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Another good catch by @TomSellers - VMware's website advisory has less detail than their github for some reason.

      Their github: https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004

      According to their Github, additional VMware ESXi versions are impacted (e.g. 6.5, 6.7) and older versions are likely impacted but no patches available.

      An in the wild exploit for RCE hypervisor escape across every supported (and unsupported) product like this is unprecedent.

      In conversation about 3 months ago permalink

      Attachments



    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 05-Mar-2025 03:00:16 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Quick mspaint.exe diagram on this, calling it ESXicape

      - Have access to something like a Windows 11 Virtual Desktop system in VMware, or a Linux box or some such?

      - Use ESXicape, a chain of three zero days, to gain access to the ESXi Hypervisor.

      - Use that to access every other VM, and be on the management network of VMware cluster

      One you have this level of access, traditionally you'll see groups like ransomware actors steal files and wipe things. #ESXicape

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/105/452/575/860/008/original/c3c692d4397f87bc.png
    • Embed this notice
      Dan Goodin (dangoodin@infosec.exchange)'s status on Wednesday, 05-Mar-2025 04:30:12 JST Dan Goodin Dan Goodin
      in reply to

      @GossiTheDog

      I just came here to ask you why these vulnerabilities are rated so critical if they can't be remotely exploited. Looks like you partially answered my question, but can you say more, please? Isn't it pretty much always game over when a threat actor has unauthorized access to a VM connected to your network? What's the scenario you're envisioning that makes these CVEs such a threat?

      In conversation about 3 months ago permalink
    • Embed this notice
      Dan Goodin (dangoodin@infosec.exchange)'s status on Wednesday, 05-Mar-2025 04:36:20 JST Dan Goodin Dan Goodin

      @GossiTheDog

      OK, thanks, Kevin. Is it fair to compare accessing the hypervisor to gaining control over an Active Directory?

      In conversation about 3 months ago permalink
    • Embed this notice
      Dan Goodin (dangoodin@infosec.exchange)'s status on Wednesday, 05-Mar-2025 04:44:50 JST Dan Goodin Dan Goodin

      @GossiTheDog

      So, an attacker who gets access to a hypervisor in, say, GM's network also gets access in Ford's network? I don't think that's what you mean, but that's how it sounds to me.

      In conversation about 3 months ago permalink
    • Embed this notice
      Tom Sellers (tomsellers@infosec.exchange)'s status on Wednesday, 05-Mar-2025 04:53:13 JST Tom Sellers Tom Sellers
      • Dan Goodin

      @GossiTheDog @dangoodin Compromise of the VMware ESXi host can result in compromise of the guests. Companies often run Active Directory controllers on VMware so compromise of the host can result in AD compromise as well. The VMware management infrastructure, such as vSphere, vCloud Director, etc also runs in VMware so you can compromise those as well. This applies to any sensitive workloads that you can run in a virtual machine.

      Networking for the guests is handled by the ESXi host. If you have full control of the host you can sniff and inject traffic, potentially impact local routing, etc.

      In conversation about 3 months ago permalink
    • Embed this notice
      Christoffer S. (nopatience@swecyb.com)'s status on Wednesday, 05-Mar-2025 05:01:31 JST Christoffer S. Christoffer S.
      • Dan Goodin

      @GossiTheDog @dangoodin

      If you perhaps remember the attack against TietoEvry in Sweden... there has been speculation that it was executed because of exactly this.

      Attacker escaped from VM into the entire VMware cluster... which led to pretty much a full compromise of the entire datacenter.

      Now it's NOT KNOWN whether this was the actual flaw that led to the successful attack, but it certainly is a very plausible (and viable) vector.

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 05-Mar-2025 19:37:00 JST Kevin Beaumont Kevin Beaumont
      in reply to

      I wrote up everything I know about #ESXicape https://doublepulsar.com/use-one-virtual-machine-to-own-them-all-active-exploitation-of-esxicape-0091ccc5bdfc

      In conversation about 3 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: miro.medium.com
        Use one Virtual Machine to own them all — active exploitation of ESXicape
        from https://medium.com/@networksecurity
        A chain of three zero days allow threat actors to escape a Virtual Machine.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 06-Mar-2025 01:33:36 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Does anybody know anybody at VMware Security who could have a look at the #ESXicape knowledge base article please?

      It's missing 6.5 and 6.7, which are definitely vulnerable and have patches available on Broadcom's site. They're also listed in the VMware Github advisory, but have been missed off the support site. It's causing people to not patch.

      In conversation about 3 months ago permalink

      Attachments


      1. https://cyberplace.social/system/media_attachments/files/114/110/783/048/990/426/original/ced086ad7ababaee.png
    • Embed this notice
      waldi (waldi@chaos.social)'s status on Thursday, 06-Mar-2025 01:54:26 JST waldi waldi
      in reply to

      @GossiTheDog This might be because 6.5 and 6.7 are not longer general supported.

      In conversation about 3 months ago permalink
    • Embed this notice
      Chad Brigance (definity@infosec.exchange)'s status on Thursday, 06-Mar-2025 02:52:25 JST Chad Brigance Chad Brigance
      in reply to

      @GossiTheDog they kept it off on purpose. The GitHub page even says so. It's weird though and is very confusing for those who actually might have a legit reason to run 6.5 and 6.7.
      --------------
      Products that are past their End of General Support dates are not evaluated as part of security advisories, and are not listed in the official VMSA. Broadcom strongly encourages all customers using vSphere 6.5 and 6.7 to update to vSphere 8.

      https://github.com/vmware/vcf-security-and-compliance-guidelines/tree/main/security-advisories/vmsa-2025-0004#does-this-impact-vmware-vsphere-65-or-67

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Monday, 10-Mar-2025 04:54:10 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Both VMware and Microsoft have declined to comment about #ESXicape, when asked about number of victims and who has the exploit.

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 26-Mar-2025 01:09:17 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Some background on Positive Technologies https://www.technologyreview.com/2021/04/15/1022895/us-sanctions-russia-positive-hacking/

      In conversation about 3 months ago permalink

      Attachments

      1. Domain not in remote thumbnail source whitelist: wp.technologyreview.com
        The $1 billion Russian cyber company that the US says hacks for Moscow
        Washington has sanctioned Russian cybersecurity firm Positive Technologies. US intelligence reports claim it provides hacking tools and runs operations for the Kremlin.
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Wednesday, 26-Mar-2025 01:09:18 JST Kevin Beaumont Kevin Beaumont
      in reply to

      A new twist on #ESXicape - you need local admin rights to escape the VM to the hypervisor, right?

      Slight issue - VMware Tools, installed inside VMs, allows local user to local admin privilege escalation on every VM due to vuln CVE-2025-22230

      “A malicious actor with non-administrative privileges on a Windows guest VM may gain ability to perform certain high-privilege operations within that VM.”

      Discovered by Positive Technologies, who US claim hack for Moscow.

      https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/25518

      In conversation about 3 months ago permalink
    • Embed this notice
      Kevin Beaumont (gossithedog@cyberplace.social)'s status on Thursday, 15-May-2025 03:48:35 JST Kevin Beaumont Kevin Beaumont
      in reply to

      Reupping this thread - remember to patch both #ESXicape and CVE-2025-22230 in VMware Tools.

      The four vulns chained together allow full hypervisor escape from a Windows VM, without needing admin rights, gaining full SAN storage access to all VMs from one host - including to backups.

      I understand technical exploitation details for this will start to emerge in public late next week, which will enable more groups to jump on the bandwagon. Currently limited to a ransomware group.

      In conversation about a month ago permalink
    • Embed this notice
      David Wong (david_wong@cyberplace.social)'s status on Thursday, 22-May-2025 21:38:40 JST David Wong David Wong
      in reply to

      @GossiTheDog Still no news or context ?

      In conversation about a month ago permalink

Feeds

  • Activity Streams
  • RSS 2.0
  • Atom
  • Help
  • About
  • FAQ
  • TOS
  • Privacy
  • Source
  • Version
  • Contact

GNU social JP is a social network, courtesy of GNU social JP管理人. It runs on GNU social, version 2.0.2-dev, available under the GNU Affero General Public License.

Creative Commons Attribution 3.0 All GNU social JP content and data are available under the Creative Commons Attribution 3.0 license.