The National Cyber Security Centre of Slovakia, known as SK-CERT, has raised an alarm regarding a critical zero-day vulnerability in the VMware ESXi system. The advisory indicates that this vulnerability can be exploited using valid ESXi credentials, creating significant risks for virtual servers running under privileged user settings.
"This vulnerability allows for code execution in virtual servers without needing knowledge of the credentials to those servers," stated a representative from SK-CERT. The organization highlights that, to take advantage of this vulnerability, access to the ESXi administrative interface is necessary. In light of this, the CVSS score stands at 3.9, indicating a lower severity; however, the ongoing activity from the hacking group known as UNC3386 underscores the urgency of the situation.
"This vulnerability allows for code execution in virtual servers without needing knowledge of the credentials to those servers,"
Despite the moderate CVSS score, the exploitation of this vulnerability is particularly alarming due to the prevalence of the VMware platform in Slovakia. "Not all organizations pay attention to regularly updating the virtualization software, which contributes to the vulnerability's exploitation," said an official commenting on the lack of awareness in certain sectors.
"Not all organizations pay attention to regularly updating the virtualization software, which contributes to the vulnerability's exploitation,"

The UNC3386 hacking group, which is reportedly linked to the Chinese government, has allegedly been utilizing this vulnerability for an extended period. The group is known for employing such vulnerabilities to install malicious code that facilitates espionage efforts. "It is advisable for organizations to check their virtual servers for possible indicators of compromise and the presence of malware," the SK-CERT representative cautioned.
"It is advisable for organizations to check their virtual servers for possible indicators of compromise and the presence of malware,"
Impact and Legacy
The vulnerability tracking number is CVE-2023-20867, and it poses serious threats to both the confidentiality and integrity of impacted systems. A fully compromised ESXi host may lead to VMware Tools failing to authenticate host-to-guest operations, resulting in potential service disruptions and data breaches.
- "In the event of a cybersecurity incident detection, report the incident to the National Cyber Security Centre SK-CERT at [email protected]," urged the center.

- Organizations are also advised to check their virtual servers for signs of malicious code.
- Regular updates to all components of the VMware virtualization platform are crucial to minimize vulnerabilities.
The advice to report any incidents underscores the proactive role that SK-CERT aims to play in enhancing national cybersecurity. According to industry experts, organizations must prioritize these updates and security checks to prevent falling victim to such threats.
As the UNC3386 group continues to utilize this vulnerability for malicious purposes, vigilance and prompt action are vital in maintaining the integrity of virtual infrastructures. In today's cyber landscape, where threats evolve rapidly, fostering awareness and adherence to security protocols can make a significant difference in safeguarding sensitive information and systems.
Looking Ahead
Organizations are strongly encouraged to implement good security hygiene practices and maintain communication with their national cybersecurity bodies, such as SK-CERT, to ensure they are informed about emerging threats. By doing so, they can better prepare and respond to potential cybersecurity incidents related to this vulnerability and others in the future.


