文章预览
更多安全资讯和分析文章请关注启明星辰ADLab微信公众号及官方网站(adlab.venustech.com.cn) 01 漏洞概述 近日,微软披露了一个ESXi漏洞(编号为CVE-2024-37085)的在野攻击报告[1]。该漏洞是VMware ESXi的一个认证绕过漏洞,已被多个勒索软件所利用。通过该漏洞,攻击者可获取加入AD域的ESXi的完全操作权限,控制该ESXi中包含的虚拟机等。 漏洞的NVD描述为[2]:VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD。 02 漏洞影响版本 官方发布的ESXi影响版本: VMware Product Version Running On ESXi 8.0 Any ESXi 7.0 Any 经过启明星辰 ADLab的 测试和验证,发现低版本的ESXi同样受影响。
………………………………