FOCUS FRIDAY: TPRM INSIGHTS ON VMWARE ESXi AUTHENTICATION BYPASS VULNERABILITY
Welcome to this week’s Focus Friday blog, where we dive into high-profile incidents affecting the cybersecurity landscape from a Third-Party Risk Management (TPRM) perspective. This week, we focus on a significant vulnerability in VMware ESXi, identified as CVE-2024-37085, which has been actively exploited by ransomware operators. We will explore the details of this vulnerability, its implications for TPRM professionals, and how Black Kite’s FocusTagsTM can aid in managing these risks effectively.
VMware ESXi Authentication Bypass Vulnerability (CVE-2024-37085)
What is VMware ESXi Authentication Bypass Vulnerability?
CVE-2024-37085 is an authentication bypass vulnerability in VMware ESXi. This medium-severity flaw, with a CVSS score of 7.2 and an EPSS score of 1.18%, allows attackers with sufficient Active Directory (AD) permissions to gain full administrative access to ESXi hosts configured to use AD for user management. It was first discovered by Microsoft security researchers and fixed in ESXi 8.0 Update 3, released on June 25, 2024. The vulnerability has been actively exploited in the wild, particularly by ransomware operators deploying Akira and Black Basta ransomware.
Why Should TPRM Professionals Care About This Vulnerability?
This vulnerability is critical for TPRM professionals because it allows threat actors to gain administrative control over ESXi hypervisors, enabling mass encryption of virtual machines and severe operational disruptions. The exploitation of this vulnerability can lead to significant data loss, unauthorized access to sensitive information, and lateral movement within the network (National Vulnerability Database).
PoC is available, and the vulnerability was published in CISA's Known Exploited Vulnerabilities catalog on July 30, 2024. Due to its inherently exploitable nature, threat actors can readily exploit this vulnerability. The severity of these vulnerabilities is underscored by their potential impact on system integrity and confidentiality. The ESXi hypervisor vulnerability is actively being exploited by ransomware operators such as Storm-0506, Storm-1175, Octo Tempest, and Manatee Tempest.
What Questions Should TPRM Professionals Ask Vendors About This Vulnerability?
Remediation Recommendations for Vendors
To mitigate the risk associated with CVE-2024-37085, vendors should:
1. Apply Security Patches
Install the latest security patches released by VMware for ESXi hypervisors:
2. Risk Reduction Recommendations
How TPRM Professionals Can Leverage Black Kite for This Vulnerability
Black Kite's FocusTags provide detailed information about vendors potentially affected by CVE-2024-37085, published on July 31, 2024. TPRM professionals can use these tags to quickly identify at-risk vendors, understand specific assets involved, and streamline risk assessment processes. By leveraging detailed asset information, Black Kite enables a targeted approach to managing the risk posed by this vulnerability, enhancing overall cybersecurity posture.
Timeline for CVE-2024-37085:
Jun 25, 2024 (Tuesday):
Jun 26, 2024 (Wednesday):
领英推荐
Jun 29, 2024 (Saturday):
Jun 30, 2024 (Sunday):
July 29, 2024 (Monday):
July 30, 2024 (Tuesday):
Enhancing TPRM Strategies With Black Kite’s FocusTags?
In today’s rapidly evolving cyber threat landscape, staying ahead of vulnerabilities is imperative for robust Third-Party Risk Management (TPRM). Black Kite’s FocusTags? are at the forefront of this challenge, providing essential insights and tools to effectively manage these risks. The value of this tag becomes evident when faced with a critical vulnerability like this in VMware ESXi.
Black Kite’s FocusTags?, especially when dealing with the complexities of recent vulnerabilities in diverse systems, offer a streamlined, intelligent approach to TPRM, converting intricate cyber threat data into actionable intelligence. This capability is critical for managing risks efficiently and proactively in an environment where cyber threats are constantly evolving.
By leveraging Black Kite’s FocusTags?, TPRM professionals can enhance their risk management strategies, ensuring a more secure and resilient supply chain in the face of evolving cyber threats.
About Focus Friday
Every week, we delve into the realms of critical vulnerabilities and their implications from a Third-Party Risk Management (TPRM) perspective. This series is dedicated to shedding light on pressing cybersecurity threats, offering in-depth analyses, and providing actionable insights.
FocusTagsTM in the Last 30 Days:
References
Read the blog post here: https://blackkite.com/blog/focus-friday-tprm-insights-on-vmware-esxi-authentication-bypass-vulnerability/