Zero-Day Vulnerability Threatens VMware ESXi Systems in Slovakia
Cybersecurity3 min read

Zero-Day Vulnerability Threatens VMware ESXi Systems in Slovakia

14 June 202314 June 2023 sk-cert.sk

The National Cyber Security Centre SK-CERT has issued a warning about a zero-day vulnerability affecting VMware ESXi systems, potentially exploited by hackers. Organizations are advised to take immediate action to safeguard their virtual servers.

Key Takeaways

  • 1.According to industry experts, organizations must prioritize these updates and security checks to prevent falling victim to such threats.
  • 2."This vulnerability allows for code execution in virtual servers without needing knowledge of the credentials to those servers," stated a representative from SK-CERT.
  • 3.> "This vulnerability allows for code execution in virtual servers without needing knowledge of the credentials to those servers," Despite the moderate CVSS score, the exploitation of this vulnerability is particularly alarming due to the prevalence of the VMware platform in Slovakia.

The National Cyber Security Centre of Slovakia, known as SK-CERT, has raised an alarm regarding a critical zero-day vulnerability in the VMware ESXi system. The advisory indicates that this vulnerability can be exploited using valid ESXi credentials, creating significant risks for virtual servers running under privileged user settings.

"This vulnerability allows for code execution in virtual servers without needing knowledge of the credentials to those servers," stated a representative from SK-CERT. The organization highlights that, to take advantage of this vulnerability, access to the ESXi administrative interface is necessary. In light of this, the CVSS score stands at 3.9, indicating a lower severity; however, the ongoing activity from the hacking group known as UNC3386 underscores the urgency of the situation.

"This vulnerability allows for code execution in virtual servers without needing knowledge of the credentials to those servers,"

Despite the moderate CVSS score, the exploitation of this vulnerability is particularly alarming due to the prevalence of the VMware platform in Slovakia. "Not all organizations pay attention to regularly updating the virtualization software, which contributes to the vulnerability's exploitation," said an official commenting on the lack of awareness in certain sectors.

"Not all organizations pay attention to regularly updating the virtualization software, which contributes to the vulnerability's exploitation,"

Person using laptop with holographic cybersecurity shield and digital interface elements
Person using laptop with holographic cybersecurity shield and digital interface elements

The UNC3386 hacking group, which is reportedly linked to the Chinese government, has allegedly been utilizing this vulnerability for an extended period. The group is known for employing such vulnerabilities to install malicious code that facilitates espionage efforts. "It is advisable for organizations to check their virtual servers for possible indicators of compromise and the presence of malware," the SK-CERT representative cautioned.

"It is advisable for organizations to check their virtual servers for possible indicators of compromise and the presence of malware,"

Impact and Legacy

The vulnerability tracking number is CVE-2023-20867, and it poses serious threats to both the confidentiality and integrity of impacted systems. A fully compromised ESXi host may lead to VMware Tools failing to authenticate host-to-guest operations, resulting in potential service disruptions and data breaches.

- "In the event of a cybersecurity incident detection, report the incident to the National Cyber Security Centre SK-CERT at [email protected]," urged the center.

Data center server room with multiple monitors displaying code and red LED lighting
Data center server room with multiple monitors displaying code and red LED lighting

- Organizations are also advised to check their virtual servers for signs of malicious code.

- Regular updates to all components of the VMware virtualization platform are crucial to minimize vulnerabilities.

The advice to report any incidents underscores the proactive role that SK-CERT aims to play in enhancing national cybersecurity. According to industry experts, organizations must prioritize these updates and security checks to prevent falling victim to such threats.

As the UNC3386 group continues to utilize this vulnerability for malicious purposes, vigilance and prompt action are vital in maintaining the integrity of virtual infrastructures. In today's cyber landscape, where threats evolve rapidly, fostering awareness and adherence to security protocols can make a significant difference in safeguarding sensitive information and systems.

Looking Ahead

Organizations are strongly encouraged to implement good security hygiene practices and maintain communication with their national cybersecurity bodies, such as SK-CERT, to ensure they are informed about emerging threats. By doing so, they can better prepare and respond to potential cybersecurity incidents related to this vulnerability and others in the future.

More Stories