Just one compromised VM can make all other VMs on that hypervisor sitting ducks.
See full article...
See full article...
There's also another solid mitigation route available, that Broadcom has been convincing people to take.Did I miss it or is there no mitigation/patch available for these yet?
Edit: Never mind, the actual VMWare advisory appears to indicate there are.
My copy of VMware Fusion for macOS got an automated update this morning.Did I miss it or is there no mitigation/patch available for these yet?
Edit: Never mind, the actual VMWare advisory appears to indicate there are.
And the world continues to turn. I am involved with just as many projects bring stuff on-prem as sending stuff to the cloud.Only a matter of time until a similar exploit occurs on AWS, Azure, and GCP. That's when the great migration back to on prem returns
That could be a very long time coming. The big cloud providers have shown actual competency with cybersecurity and given how much critical infrastructure runs on the big three cloud providers, a serious attack would generate a national security response, so too much heat for most cybercrime groups. That being said, if things get hot between China and Taiwan and the US intervenes on Taiwan's side I expect hell to be unleashed on the big three by Chinese government agencies and state-sponsored groups.Only a matter of time until a similar exploit occurs on AWS, Azure, and GCP. That's when the great migration back to on prem returns
Had the same issueSure would be nice if my vsphere would show this update… been checking all day, bupkis.
Do you use the Life Cycle Manager or just the default/older style updating system?Had the same issue
Had the same issue
I just wanted to call out this perfect summary of Broadcom. 10 thumbs up. No notes.There's also another solid mitigation route available, that Broadcom has been convincing people to take.
Why? Hegseth would probably just let Kaspersky buy the SSL certificate keys and force DigiCert to hand them over for a $500,000 donation to Trump's 3rd term election campaign committee.My copy of VMware Fusion for macOS got an automated update this morning.
Anyway, I wonder if the Russians will now step up their hacking activities since Hegseth has just rolled over.
China and Russia are pals. They've already got a foot in the door. The parent company is Chinese owned.My copy of VMware Fusion for macOS got an automated update this morning.
Anyway, I wonder if the Russians will now step up their hacking activities since Hegseth has just rolled over.
We all love giving Broadcom a good swift kick, but given that out-of-date vSphere versions are still vulnerable, the issue predates Broadcom's involvement.Gotta love it when a company commits seppuku by adding poison to the blade.
Then again, it could help accelerate the exodus and speed the death of the company, so... Mission accomplished soon?
This is more like that baddie in Hero Yoshihiko who licked his poisoned knife.Gotta love it when a company commits seppuku by adding poison to the blade.
Then again, it could help accelerate the exodus and speed the death of the company, so... Mission accomplished soon?
We all love giving Broadcom a good swift kick, but given that out-of-date vSphere versions are still vulnerable, the issue predates Broadcom's involvement.
100%. This is exactly the conversation I have with customers on a weekly basis. It's an excruciating position for them to be in.It's definitely Vmware's defect; but what is unfortunate is that, thanks to the Broadcom shakeup, it's hard to think of a worse time for it to have come to light. Probably a historically large number of ESX hosts without access to patches because people were hoping to get them through a transition plan without having to move from vmware pricing to broadcom pricing.
It always bugs me when this isn't directly stated in an article.Did I miss it or is there no mitigation/patch available for these yet?
Edit: Never mind, the actual VMWare advisory appears to indicate there are.
Read the article, the attacker has to have root access on the host. If he's already there, you probably have bigger worries.Excellently written article here
Follow up
https://www.bleepingcomputer.com/ne...-three-vmware-zero-days-exploited-in-attacks/
![]()
To paraphrase Joseph Heller, "just because you're cynical doesn't mean they're not screwing you."The cynic in me sees this as an awfully convenient way to force former customers who said “support is now too expensive, we’ll just keep running our current version” to pay up.
Dear Valued Customer,
This is a reminder that your VMware vSphere support contract expired within the last 30 days. As we've transitioned to a subscription-based model, we can no longer renew your previous support contract.
To keep access to:
The latest vSphere updates
Round-the-clock support
Innovative new features
Contact your Preferred Partner to renew your subscription. If you aren't sure who that is, use our Partner Locator.
As a reminder, critical security patches will still be available for vSphere versions 7.x and 8.x, but we recommend renewing to ensure full access to all support services.
I don't feel like this generic response works here. In this context, managed root access is the service providers are typically selling. It doesn't implicitly represent a secure enclave controlled by a non-malicious actor.Read the article, the attacker has to have root access on the host. If he's already there, you probably have bigger worries.
Thanks. If that's the case then Dan Goidin's article downplays the risk:Consider that an attacker should be able to sign up for basic service from any VM provider. This would typically generate a virtual machine on the provider's backbone and give the attacker root access to this virtual machine.
The attacker didn't need to compromise an existing customer, they could just sign up for their own VMware guest with a credit card and upload the vulnerabilities. Or have all hosting providers moved away from VMware?In other words, if any customer with a VM inside a vulnerable hosting environment is compromised, an attacker might be able to take control of the host environment hypervisor.
The cynic in me sees this as an awfully convenient way to force former customers who said “support is now too expensive, we’ll just keep running our current version” to pay up.
Unless you have already migrated off of VMWare and raising a single finger salute to Broadcom. Last year was taxing getting off VMWare but it was well worth it.Threat posed by new VMware hyperjacking vulnerabilities is hard to overstate.
++ for Proxmox, for sure. I'm more and more glad every day that I moved off of my VMWare stack (and the costs associated with it).Yea, I'm liking ProxMox ..
Software with massive, known, exploited security holes is not "working fine".Hrm, the security document says all VMware Fusion 13.x versions are vulnerable before 13.6.3. But 13.5.2 is the last version that runs on Mac OS X 12, and I'm not seeing an update to the 13.5.x line.
Yes I know time to think about upgrading hardware, but I hate to mess with things that are otherwise working fine.