<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: Known VMware Vulnerability is Under Active Exploitation in Threats</title>
    <link>https://community.isc2.org/t5/Threats/Known-VMware-Vulnerability-is-Under-Active-Exploitation/m-p/66499#M1046</link>
    <description>Vendor has patched even old product chaps and chapettes!&lt;BR /&gt;&lt;BR /&gt;Patch or have you IP stolen and turned into advantage by your state sponsored competitors…&lt;BR /&gt;&lt;BR /&gt;</description>
    <pubDate>Wed, 24 Jan 2024 10:04:53 GMT</pubDate>
    <dc:creator>Early_Adopter</dc:creator>
    <dc:date>2024-01-24T10:04:53Z</dc:date>
    <item>
      <title>Known VMware Vulnerability is Under Active Exploitation</title>
      <link>https://community.isc2.org/t5/Threats/Known-VMware-Vulnerability-is-Under-Active-Exploitation/m-p/66485#M1043</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Researchers at Mandiant and VMware Product Security have observed state-sponsored threat actors exploiting a known vulnerability in VMware vCenter Server. The out-of-bounds write issue was disclosed and patched in October 2023. VMware determined that the vulnerability was severe enough to merit releasing fixes for products that had reached end-of-life.&lt;/P&gt;&lt;P&gt;&lt;BR /&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/chinese-hackers-exploit-vmware-bug-as-zero-day-for-two-years/?is=12aceb95f78a59af1317cc4ec15f6e06e7c0e0bd3d6a9255b9e44810d70dbba5" target="_blank"&gt;Chinese hackers exploit VMware bug as zero-day for two years (bleepingcomputer.com)&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 24 Jan 2024 02:09:12 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Known-VMware-Vulnerability-is-Under-Active-Exploitation/m-p/66485#M1043</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-01-24T02:09:12Z</dc:date>
    </item>
    <item>
      <title>Re: Known VMware Vulnerability is Under Active Exploitation</title>
      <link>https://community.isc2.org/t5/Threats/Known-VMware-Vulnerability-is-Under-Active-Exploitation/m-p/66499#M1046</link>
      <description>Vendor has patched even old product chaps and chapettes!&lt;BR /&gt;&lt;BR /&gt;Patch or have you IP stolen and turned into advantage by your state sponsored competitors…&lt;BR /&gt;&lt;BR /&gt;</description>
      <pubDate>Wed, 24 Jan 2024 10:04:53 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/Known-VMware-Vulnerability-is-Under-Active-Exploitation/m-p/66499#M1046</guid>
      <dc:creator>Early_Adopter</dc:creator>
      <dc:date>2024-01-24T10:04:53Z</dc:date>
    </item>
  </channel>
</rss>

