Critical Path Security: Mitigating CVE-2024-37085 Exploitation in ESXi Hypervisors
Photo courtesy of Microsoft Microsoft researchers have recently uncovered a significant vulnerability in ESXi hypervisors, CVE-2024-37085, which is being actively exploited by several ransomware operators. This vulnerability allows attackers to obtain full administrative permissions on domain-joined ESXi hypervisors, posing a substantial threat to network security. Understanding the Vulnerability ESXi is a bare-metal hypervisor installed directly onto physical servers, providing direct access and control over underlying resources. It hosts virtual machines (VMs) that often include critical servers within a network. In a ransomware attack, gaining full administrative permissions on an ESXi hypervisor can enable threat actors to encrypt the file system, disrupt hosted servers, exfiltrate data, or move laterally within the network. The identified vulnerability involves a domain group named "ESX Admins." Members of this group are granted full administrative access to the ESXi hypervisor by default, without proper validation. Microsoft disclosed this finding to VMware through Coordinated Vulnerability Disclosure (CVD),…