iTnews Asia
  • Home
  • News
  • Security

Chinese attackers exploiting unpatched VMware ESXi instances

Chinese attackers exploiting unpatched VMware ESXi instances

Mandiant spots zero-day attacks.

By Richard Chirgwin on Jun 14, 2023 11:52AM

Security researchers from Mandiant have identified a Chinese APT group exploiting a VMware ESXi zero-day vulnerability as part of a campaign tracked since September 2022.

The attacks, by a group Mandiant tagged as UNC3886, were first observed last year, with the company accusing UNC3886 of credential harvesting and backdoor deployment.

The attackers also try to block investigations by disabling logging on compromised systems.

Exploitation of the zero-day, CVE-2023-20867, was new, Mandiant said.

VMware’s advisory for the CVE rated it only as a low risk, because it can only be exploited by an attacker with a “fully compromised ESXi host” – that is, someone with root access to the server.

“A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine,” VMware said, issuing VMware Tools 12.2.5 to fix the issue.

Describing UNC3886’s activity, Mandiant wrote that “the attacker utilised a zero-day vulnerability, CVE-2023-20867, to execute commands and transfer files to and from guest VMs from a compromised ESXi host without the need for guest credentials."

“Additionally, the use of CVE-2023-20867 does not generate an authentication log event on the guest VM when commands are executed from the ESXi host," it wrote.

UNC3886’s long campaign of credential harvesting rested on a 2022 vulnerability, CVE-2022-22948. 

Discovered by Pentera researcher Yuval Lazar, CVE-2022-22848 was a privilege escalation bug that let attackers harvest vpxuser credentials stored on a vCenter server.

With those credentials in hand, the attackers performed host and guest machine enumeration, and were able to manipulate the vCenter to ESXi firewall and install malicious software.

CVE-2023-20867 depended only on two conditions for exploitation: an attacker with privileged access to the ESXi host (credentials the attackers had obtained in their earlier campaign); and the target machine having VMware Tools installed.

Companies affected should look for the VirtualPita and VirtualGate backdoors, which UNC3886 installed on compromised systems to give them lateral movement and persistence.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
esxi mandiant security vmware

Related Articles

  • Beware the rise of ‘vishing’ as a cyber threat in APAC
  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Beware the rise of ‘vishing’ as a cyber threat in APAC

Beware the rise of ‘vishing’ as a cyber threat in APAC

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.