Date | 7-2-2023 |
Number | CNW-2023-01 |
Keywords | VMware ESXiArgs ransomware |
CVE | CVE-2021-21974 |
Details | ESXiArgs ransomware was recently reported exploiting CVE-2021-21974, a critical privilege escalation vulnerability impacting the VMware ESXi OpenSLP service (typically running on port 427) which can lead to remote code execution (RCE), in infecting hundreds of vulnerable ESXi servers worldwide in early February 2023. Most of the affected organizations were using ESXi servers rented from cloud providers. |
Mitigation | To mitigate attacks, organizations running VMWare servers are advised to patch ESXi servers, move to a version not affected by the attacks (such as v8), or disable the OpenSLP service. For additional details please refer to the specific CNW member advisories referenced below. |
For more information on the CSIRTs Network Members please visit https://csirtsnetwork.eu/