VMware

Chris Swagler | March 17th, 2023

 

A critical severity vulnerability in VMware’s Cloud Foundation was added to the CISA’s list of security flaws exploited in the wild. The vulnerability, known as CVE-2021-39144, was discovered in the XStream open-source library, which is utilized by vulnerable VMware products, and was assigned a nearly maximum severity score of 9.8/10 by VMware. The vulnerability can be exploited in low-complexity cyberattacks by unauthenticated threat actors that don’t require user interaction to remotely execute arbitrary code with root privileges on unpatched appliances. Malicious threat actors can obtain remote execution in the role of “root” on appliances due to unauthenticated endpoints that employ XStream for input serialization in VMware Cloud Foundation (NSX-V). Security updates were released on October 25th to address the CVE-2021-39144 vulnerability by researchers. Due to the severity of the problem, VMware released updates for some discontinued products. A post was published about the technical details and proof-of-concept (PoC) exploit code on the day CVE-2021-39144 patches were released.

VMware Exploited in RCE Vulnerability

Adding the CVE-2021-39144 vulnerability to the CISA’s Known Exploited Vulnerabilities (KEV) list comes after VMware confirmed that the flaw was exploited in the wild. The updated advisory contains information VMware received about the CVE-2021-39144 exploitation activities in the wild which the company noted as part of the original advisory. A cybersecurity company disclosed that the CVE-2021-39144 exploitation began within weeks after security updates were released and has been continuing since early December 2022. Every day, the cybersecurity team finds and analyzes numerous vulnerabilities, and the CVE-2021-39144 vulnerability is very interesting because it was exploited over 40,000 times in the last two months. The impact of the vulnerabilities can be devastating if successfully exploited, allowing threat operators to execute arbitrary code, steal data, and/or have full control of network infrastructures.

The United States federal agencies were ordered by CISA to safeguard their systems against cyberattacks within three weeks, until March 31st, to combat attacks that can target their networks. Even though the binding operational directive (BOD 22-01) underlying CISA’s order only applies to United States federal agencies, the cybersecurity company has strongly recommended all companies patch the flaw to protect their servers from ongoing cyberattacks. The vulnerabilities are common attack vectors for malicious threat actors, posing considerable threats to federal enterprises.

With new and current vulnerabilities being exploited by malicious threat actors to target vulnerable data networks, it’s important for companies to always remain vigilant of the latest threat landscape and regularly release security patches to prevent future exploitations. At SpearTip, our team of engineers focuses on restoring companies’ operations, isolating malware to reclaim their networks, and recovering business-critical assets. With our risk assessment service, we designed our risk assessment for each client to uncover gaps in security which is done by a technical summary complete with an individualized risk report detailing necessary steps to remediate the gaps. Our engineers continuously work 24/7/365 at our Security Operations Center monitoring companies’ networks for potentially exploited vulnerabilities. The ShadowSpear platform, our managed detection and response tool, utilizes detection engines powered by artificial intelligence (AI) and attack tactics, techniques, and procedures (TTP) models to detect malicious activities.

If your company is experiencing a breach, call our Security Operations Centers at 833.997.7327 to speak directly with an engineer.

Categories

Connect With Us

Featured Articles

Cyberattack on UnitedHealth's Change Healthcare
Cyberattack on UnitedHealth's Change Healthcare Results in Multi-Million Dollar Loss
26 April 2024
Industries Vulnerable to Cyberattacks
Industries Vulnerable to Cyberattacks in 2023
24 April 2024
Cybersecurity Health Checks
Cybersecurity Health Checks: Why Companies Need Them
22 April 2024
New Loop DoS Attack
New Loop DoS Attack Affecting Linux Systems
19 April 2024

See ShadowSpear in Action

Identify, neutralize, and counter cyberattacks - provide confidence in your security posture

Stay Connected With SpearTip

Inside the SOC Newsletter

View our articles that cover trending topics in cybersecurity with insights from our 24/7/365 Security Operations Center.

ShadowSpear Platform

Cybersecurity actors are working around the clock, shouldn’t your security team be too? Technology solutions and security controls fail for a number of reasons, poor deployment, improper implementation, or just no one monitoring the alerts.

ShadowSpear Demo

Experience ShadowSpear for yourself. Our lightweight, integrated solution will help you sleep easier at night and provide immediate confidence in your security posture.