According to the vulnerability report that is published on 13th of June; a fully compromised ESXI Host may force VMware Tools to fail to authenticate host-to-guest operations, negatively impacting the confidentiality and integrity of the guest virtual machine. (CVE-2023-20867) , (CVE-2022-22948)
Steps of Attack:
Affected Systems
The vulnerability that causes the encrypted "vpxuser" credentials to be obtained in clear text format (Vmware vCenter Server 6.5/6.7/.70 versions) and the vulnerability with CVE-2022-22948 are affected. VMware center server 6.5/6.7/7.0 versions:
Affected Version / | Fixed Version |
---|---|
6.5 | 6.5 U3r |
6.7 | 6.7 U3p |
7.0 | 7.0 U3d |
IoC’s
-
Recommended Solution(s)
It is recommentded to patch the affected versions if there are Vcenter in the versions specified, in the virtualization environment.
Mitigations
VMware recommends the update of vulnerability (CVE-2023-20862) that enables remote code execution on Vmware tools and make the necessary consolidations in virtualization environments within the documentation they have published;
https://core.vmware.com/vmware-vsphere-8-security-configuration-guide#use-your-headCVE / CWE
CVE-2023-20867, CVE-2022-22948
Related Website(s)
* Vulnerabilities with a CVSS 3.1 score between 7.0 and 8.9 are evaluated to be “high” whereas vulnerabilities with a CVSS 3.1 score between 9.0 and 10.0 are evaluated to be “critical”.
+90 216 504 53 32
Aydınevler Mahallesi,İsmet İnönü Cadddesi,Küçükyalı Ofis Park A Blok,No:20/1 Maltepe İstanbul
+90 312 235 44 51
You can register to our newsletter on the home page to be instantly informed about security vulnerabilities.