News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

Critical security vulnerabilities in VMware
B2B Cyber ​​Security ShortNews

Security vulnerabilities have been discovered in some VMware products. The BSI classifies these vulnerabilities as critical. Among other things, the USB controllers in various devices are affected. A local attacker can exploit multiple vulnerabilities in VMware ESXi, VMware Workstation, VMware Fusion and VMware Cloud Foundation to execute arbitrary code, bypass security measures or disclose information, warns the BSI and recommends using updates as they become available. CVSS vulnerability scores range from 7,1 to 9,3. They are all classified as critical because they allow attackers to bypass virtual machines and access the…

Read more

VMware: Critical 9.9 vulnerability in Aria Automation
B2B Cyber ​​Security ShortNews

VMware reports a critical vulnerability in Aria Automation with a CVSS score of 9.9 and strongly recommends an update. Otherwise, attackers could gain unauthorized access to remote organizations and workflows. The update is ready Aria Automation contains a security vulnerability regarding lack of access control. VMware has assessed the severity of this issue in the Critical Severity range with a maximum CVSSv3 base value of 9.9. The Aria Automation lack of access control vulnerability was defined in CVE-2023-34063. According to VMware, “An authenticated malicious actor could exploit this vulnerability and result in unauthorized access to remote organizations and workflows.” Updates are available…

Read more

After Cyberattack: Accelerating Recovery for VMware
After a cyber attack: Accelerating recovery for VMware - Image by Hans on Pixabay

Rubrik introduces new generative AI capabilities for VMware with Rubrik AI-Powered Cyber ​​Recovery. Using generative AI and large language models (LLMs), the new solution helps administrators make difficult decisions after cyberattacks to minimize data loss and reduce downtime. Additionally, the features enable backup administrators to deploy recommended task lists and guided workflows to ensure efficient data recovery and maintain cyber resilience. Cyberattacks pose one of the greatest threats to enterprise virtual machines. Maintaining cyber resilience in the face of cyberattacks requires the ability to protect critical data such as virtual…

Read more

Critical 9,8 vulnerability: VMware Aria Operations for Networks 
B2B Cyber ​​Security ShortNews

In a new security notification, the BSI warns of 2 critical and one highly dangerous vulnerability in VMware Aria Operations for Networks. An attacker could exploit the vulnerabilities to execute arbitrary code or disclose information. The critical vulnerabilities in VMware Aria Operations for Networks have baseline CVSSv3 scores of 9,8 and 9,1. The highly dangerous vulnerability still has a value of 8,8. The vulnerabilities are described under the CVE designations CVE-2023-20887, CVE-2023-20888, and CVE-2023-20889. BSI warns of attacks The BSI names the vulnerabilities in its security advisory WID-SEC-2023-138 and warns against exploitation. VMware already offers updates...

Read more

VMware-ESXi: Attacks threaten tens of thousands of servers
VMware-ESXi: Attacks threaten tens of thousands of servers

The attacks on the VMware ESXi never end. They continue to threaten tens of thousands of servers and require updating to the latest VMware ESXi version, according to Bitdefender experts. Even rescue scripts no longer work because the ransomware has adapted. The attacks on the VMware ESXi hypervisors, which exploit the recently discovered CVE-2021-21974 vulnerability with little effort to play a wide variety of payloads as remote code, have enormous potential for spreading. They are therefore developing into mass attacks for opportunistic cybercriminals and are a current example of hybrid attacks: VMware-ESXi : Example of hybrid attack In…

Read more

VMware ESXi Server: Expert analysis of ransomware attacks
VMware ESXi Server: Expert analysis of ransomware attacks

In the ransomware wave, which, according to the BSI, affects thousands of servers worldwide, including a mid-three-digit number of German companies, the attackers are targeting server farms - so-called ESXi servers - and thus the heart of every IT landscape. Outdated and unpatched VMware ESXi servers that still work with the February 2021 vulnerability were specifically attacked. According to the BSI - Federal Office for Information Security, thousands of servers running VMware's ESXi virtualization solution were infected with ransomware and many were also encrypted in a widespread global attack. The regional focus...

Read more

CISA supplies ESXi Args Recover tool for data recovery
B2B Cyber ​​Security ShortNews

During the severe cyber attacks on thousands of older, unpatched VMare ESXi servers, many virtual machines were infected and encrypted with the ESXiArgs ransomware. ESXiArgs-Recover is a CISA tool that has already been able to recover data in some cases. CISA is aware that some companies have reported successful file recovery without paying a ransom. CISA compiled this tool based on publicly available resources, including a tutorial by Enes Sonmez and Ahmet Aykac. This tool reconstructs virtual machine metadata from virtual disks that were not encrypted by the malware….

Read more

Europe: Thousands of VMware ESXi servers attacked with ransomware
B2B Cyber ​​Security ShortNews

According to the BSI - Federal Office for Information Security, thousands of servers running VMware's ESXi virtualization solution were infected with ransomware and many were also encrypted in a widespread global attack. The regional focus of the attacks on the VMware ESXi servers was on France, the USA, Germany and Canada - other countries are also affected. The perpetrators took advantage of a long-known vulnerability in the application's OpenSLP service, which triggered a "heap overflow" and ultimately allowed code to be executed remotely. In the meantime…

Read more

VMware Warning: Patch Critical Vulnerabilities 
B2B Cyber ​​Security ShortNews

VMware releases some updates for several severe vulnerabilities in various products. With some products, it is even possible for attackers to gain administrative access to the products without a password. VMware users should act quickly, patch and close the gaps. According to VMware, the following products are affected by the gaps and patches are available: Workspace ONE Access, Workspace, ONE Access Connector, Identity Manager, Identity Manager Connector, vRealize Automation, Cloud Foundation and vRealize Suite Lifecycle Manager. The VMware advisory VMSA-2022-0021 lists the individual gaps and the recommended measures for them. VMware VMSA-2022-0021…

Read more

BSI: Combination of vulnerabilities makes VMware products vulnerable
B2B Cyber ​​Security ShortNews

The BSI reports that a combined exploitation of critical vulnerabilities can allow the takeover of selected VMWare products. The issue has a warning status of Yellow. The Common Vulnerability Scoring System (CVSS) rates the vulnerabilities at 7,8 (high) and 9,8 as critical. On May 18.05.2022th, 2022, the company VMWare published the security advisory VMSA-0014-2022 with information on two critical vulnerabilities in various VMWare products. A combined exploit of the CVE-22972-2022 and CVE-22973-XNUMX vulnerabilities could allow attackers to gain administrative access with root privileges without authentication. The following products are affected by these two vulnerabilities: VMware Workspace…

Read more