iTnews Asia
  • Home
  • News
  • Security

Chinese attackers exploiting unpatched VMware ESXi instances

Chinese attackers exploiting unpatched VMware ESXi instances

Mandiant spots zero-day attacks.

By Richard Chirgwin on Jun 14, 2023 11:52AM

Security researchers from Mandiant have identified a Chinese APT group exploiting a VMware ESXi zero-day vulnerability as part of a campaign tracked since September 2022.

The attacks, by a group Mandiant tagged as UNC3886, were first observed last year, with the company accusing UNC3886 of credential harvesting and backdoor deployment.

The attackers also try to block investigations by disabling logging on compromised systems.

Exploitation of the zero-day, CVE-2023-20867, was new, Mandiant said.

VMware’s advisory for the CVE rated it only as a low risk, because it can only be exploited by an attacker with a “fully compromised ESXi host” – that is, someone with root access to the server.

“A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine,” VMware said, issuing VMware Tools 12.2.5 to fix the issue.

Describing UNC3886’s activity, Mandiant wrote that “the attacker utilised a zero-day vulnerability, CVE-2023-20867, to execute commands and transfer files to and from guest VMs from a compromised ESXi host without the need for guest credentials."

“Additionally, the use of CVE-2023-20867 does not generate an authentication log event on the guest VM when commands are executed from the ESXi host," it wrote.

UNC3886’s long campaign of credential harvesting rested on a 2022 vulnerability, CVE-2022-22948. 

Discovered by Pentera researcher Yuval Lazar, CVE-2022-22848 was a privilege escalation bug that let attackers harvest vpxuser credentials stored on a vCenter server.

With those credentials in hand, the attackers performed host and guest machine enumeration, and were able to manipulate the vCenter to ESXi firewall and install malicious software.

CVE-2023-20867 depended only on two conditions for exploitation: an attacker with privileged access to the ESXi host (credentials the attackers had obtained in their earlier campaign); and the target machine having VMware Tools installed.

Companies affected should look for the VirtualPita and VirtualGate backdoors, which UNC3886 installed on compromised systems to give them lateral movement and persistence.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
esxi mandiant security vmware

Related Articles

  • Your organisation’s physical security can be a gateway for cybercriminals
  • The best way to outsmart your threat actors is to think like one
  • How cybercriminals are exploiting LLMs to harm your business
  • Is identity now the next parameter of cybersecurity breaches?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Your organisation’s physical security can be a gateway for cybercriminals

Your organisation’s physical security can be a gateway for cybercriminals

The best way to outsmart your threat actors is to think like one

The best way to outsmart your threat actors is to think like one

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Maxis Berhad investigates claims on alleged data breach

Malaysia's Perkeso ramps up security measures after cyber attack

Malaysia's Perkeso ramps up security measures after cyber attack

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.