Back in February 2021, I published a post named Is Your VMware vCenter Publicly Available?.
It is February 2023, and here we are again. A new widespread ransomware attack dubbed ESXiArgs is targeting publicly available ESXi hosts, using a vulnerability that was patched two years ago (CVE-2021-21947) .
For details, see Massive ESXiArgs ransomware attack targets VMware ESXi servers worldwide.
You really don’t want to wake up some day and see that your ESXi HTML Client has been replaced by a static web page, showing you how to pay the ransom…
For now it seems to be contained to publicly available ESXi hosts, but remember, the same tecnique and vulnarability is also available on the inside of your perimiter firewall, so any internal client that can access your hosts could potentially be an attacker as well.
Lessons to be learned here? #
- Don’t expose vCenter or ESXi hosts to the internet. No exceptions (except Honeypots of course)
- Ensure admin access (vCenter, ESXi and other management interfaces/APIs) is limited to clients that need it and is properly secured (think Zero Trust, MultiFactor Authentication etc.)
- Patch your stuff.
To quote myself from two years ago:
Related Posts
- VMware by Broadcom Promises Free Security Updates for vSphere — Published
- VMware Update Manager: Unsupported Configuration — Published
- ESXi5.5 to 6.0 Upgrade From Local HTTP Daemon — Published
- Root Cause of Invalid memory setting: memory reservation (sched.mem.min) should be equal to memsize (memsize) — Published
- Automatically Name Datastores in vSphere? — Published