<?xml version="1.0" encoding="UTF-8"?>
<rss xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:rdf="http://www.w3.org/1999/02/22-rdf-syntax-ns#" xmlns:taxo="http://purl.org/rss/1.0/modules/taxonomy/" version="2.0">
  <channel>
    <title>topic Re: CISA warns of VMware ESXi bug exploited in ransomware attacks in Threats</title>
    <link>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72739#M1313</link>
    <description>&lt;P&gt;CISA's directive for U.S. Federal Civilian Executive Branch agencies to secure their servers highlights the critical nature of the VMware ESXi vulnerability (CVE-2024-37085). This flaw, fixed in the recent ESXi 8.0 U3 release, allows attackers to gain high privileges and add a user with full administrative rights. It's a significant security risk, and timely action is essential to prevent exploitation, especially given its use in ransomware attacks.&lt;/P&gt;</description>
    <pubDate>Fri, 02 Aug 2024 17:47:52 GMT</pubDate>
    <dc:creator>leefarrellhelps</dc:creator>
    <dc:date>2024-08-02T17:47:52Z</dc:date>
    <item>
      <title>CISA warns of VMware ESXi bug exploited in ransomware attacks</title>
      <link>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72652#M1299</link>
      <description>&lt;P&gt;Dear All,&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;SPAN&gt;CISA has ordered U.S. Federal Civilian Executive Branch (FCEB) agencies to secure their servers against a VMware ESXi authentication bypass vulnerability exploited in ransomware attacks.&lt;/SPAN&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;Broadcom subsidiary VMware fixed this flaw (&lt;A href="https://nvd.nist.gov/vuln/detail/CVE-2024-37085" target="_blank" rel="nofollow noopener"&gt;CVE-2024-37085&lt;/A&gt;) discovered by Microsoft security researchers on June 25 with the release of ESXi 8.0 U3.&lt;/P&gt;&lt;P&gt;CVE-2024-37085 allows attackers to add a new user to the 'ESX Admins' group—not present by default but can be added after gaining high privileges on the ESXi hypervisor—which will automatically be assigned full administrative privileges.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&lt;A href="https://www.bleepingcomputer.com/news/security/cisa-warns-of-vmware-esxi-bug-exploited-in-ransomware-attacks/" target="_blank"&gt;https://www.bleepingcomputer.com/news/security/cisa-warns-of-vmware-esxi-bug-exploited-in-ransomware-attacks/&lt;/A&gt;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Wed, 31 Jul 2024 06:33:27 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72652#M1299</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-07-31T06:33:27Z</dc:date>
    </item>
    <item>
      <title>Re: CISA warns of VMware ESXi bug exploited in ransomware attacks</title>
      <link>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72739#M1313</link>
      <description>&lt;P&gt;CISA's directive for U.S. Federal Civilian Executive Branch agencies to secure their servers highlights the critical nature of the VMware ESXi vulnerability (CVE-2024-37085). This flaw, fixed in the recent ESXi 8.0 U3 release, allows attackers to gain high privileges and add a user with full administrative rights. It's a significant security risk, and timely action is essential to prevent exploitation, especially given its use in ransomware attacks.&lt;/P&gt;</description>
      <pubDate>Fri, 02 Aug 2024 17:47:52 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72739#M1313</guid>
      <dc:creator>leefarrellhelps</dc:creator>
      <dc:date>2024-08-02T17:47:52Z</dc:date>
    </item>
    <item>
      <title>Re: CISA warns of VMware ESXi bug exploited in ransomware attacks</title>
      <link>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72767#M1318</link>
      <description>&lt;P&gt;Thanks for sharing&amp;nbsp;&lt;a href="https://community.isc2.org/t5/user/viewprofilepage/user-id/1013146939"&gt;@leefarrellhelps&lt;/a&gt;.&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;&lt;P&gt;&amp;nbsp;&lt;/P&gt;</description>
      <pubDate>Sat, 03 Aug 2024 07:38:48 GMT</pubDate>
      <guid>https://community.isc2.org/t5/Threats/CISA-warns-of-VMware-ESXi-bug-exploited-in-ransomware-attacks/m-p/72767#M1318</guid>
      <dc:creator>Kyaw_Myo_Oo</dc:creator>
      <dc:date>2024-08-03T07:38:48Z</dc:date>
    </item>
  </channel>
</rss>

