{"id":41633,"date":"2020-12-08T12:29:19","date_gmt":"2020-12-08T12:29:19","guid":{"rendered":"http:\/\/icloud.pe\/blog\/?guid=a090a6c25c3debceea5ebbf3aa1e5541"},"modified":"2020-12-08T12:29:19","modified_gmt":"2020-12-08T12:29:19","slug":"russian-hackers-are-exploiting-critical-vmware-flaws","status":"publish","type":"post","link":"https:\/\/icloud.pe\/blog\/russian-hackers-are-exploiting-critical-vmware-flaws\/","title":{"rendered":"Russian hackers are exploiting critical VMware flaws"},"content":{"rendered":"<p><span class=\"field field-name-field-author field-type-node-reference field-label-hidden\"><br \/>\n      <span class=\"field-item even\"><a href=\"https:\/\/www.cloudpro.co.uk\/authors\/keumars-afifi-sabet-0\">Keumars Afifi-Sabet<\/a><\/span><br \/>\n  <\/span><\/p>\n<div class=\"field field-name-field-published-date field-type-datetime field-label-hidden\">\n<div class=\"field-items\">\n<div class=\"field-item even\"><span class=\"date-display-single\">8 Dec, 2020<\/span><\/div>\n<\/p><\/div>\n<\/div>\n<p class=\"short-teaser\">\n<a href=\"https:\/\/www.cloudpro.co.uk\/\" title=\"\" class=\"combined-link\"><\/a><\/p>\n<div class=\"field field-name-body\">\n<p>State-backed Russian\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/357827\/86-of-consumers-experience-cyber-crime-amid-coronavirus-pandemic\" >cyber criminals<\/a>\u00a0are actively exploiting a recently-patched vulnerability in a series of VMware products in order to access sensitive corporate data.<\/p>\n<p>VMware had previously\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/357874\/vmware-sounds-alarm-over-zero-day-flaws-in-multiple-products\">warned its customers about a critical command injection flaw<\/a>\u00a0in a number of its products, including Workspace One Access and Identity Manager in late November. Although the bug was considered severe, with a rating of\u00a09.1 on the CVSS threat severity scale, a patch wasn\u2019t available at the time and was only released on 3 December.\u00a0<\/p>\n<p><!--wysiwyg_see-related_plugin--><\/p>\n<p>\nHackers operating on behalf of the Russian state, however, have been actively exploiting the vulnerability to access data on targeted systems, according to an advisory issued by the\u00a0<a href=\"https:\/\/www.itpro.co.uk\/tags\/nsa\" >US National Security Agency (NSA)<\/a>.<\/p>\n<p>\u201cThe exploitation via command injection led to installation of a web shell and follow-on malicious activity where credentials in the form of SAML authentication assertions were generated and sent to Microsoft Active Directory Federation Services, which in turn granted the actors access to protected data,\u201d the advisory said.<\/p>\n<p>\u201cIt is critical when running products that perform authentication that the server and all the services that depend on it are properly configured for secure operation and integration. Otherwise, SAML assertions could be forged, granting access to numerous resources.\u201d<\/p>\n<p>Beyond the wider business community, the NSA has stressed the need for organisations involved in national defence and security to\u00a0<a href=\"https:\/\/www.itpro.co.uk\/security\/27713\/the-importance-and-benefits-of-effective-patch-management\" >apply VMware\u2019s patch<\/a>\u00a0as soon as possible, or implement workarounds until updates are feasible. The advisory also suggests that organisations review and harden their configurations as well as the monitoring of federated authentication providers.<\/p>\n<p>Beyond Workspace One Access and Identity Manager, the products affected include Access Connector and Identity Manager Connector, with specific product versions outlined in\u00a0<a href=\"https:\/\/go.skimresources.com\/?id=83015X1540107&amp;isjs=1&amp;jv=14.4.0-stackpath&amp;sref=https%3A%2F%2Fwww.itpro.co.uk%2Fsecurity%2F357874%2Fvmware-sounds-alarm-over-zero-day-flaws-in-multiple-products&amp;url=https%3A%2F%2Fwww.vmware.com%2Fsecurity%2Fadvisories%2FVMSA-2020-0027.html&amp;xguid=01DM361VEDEJTD0R32YZC2W4RR&amp;xs=1&amp;xtz=0&amp;xuuid=99d9fc8f915c7bab337242cf74d329df&amp;xjsf=other_click__auxclick%20%5B2%5D\" >VMware\u2019s original security advisory<\/a>.<\/p>\n<p>The vulnerability, tagged CVE-2020-4006, essentially allows hackers to seize control of vulnerable machines. They would first need to be armed with network access to the administrative configurator on port 8443, as well as a valid password to the admin account.<\/p>\n<p>As such the NSA has recommended that network administrators limit the accessibility of the management interface on servers to only a small set of known systems, and block it from direct internet access. Critical portions of this activity can also be blocked by disabling the firm\u2019s configurator service. <\/p>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>      Keumars Afifi-Sabet<\/p>\n<p>        8 Dec, 2020    <\/p>\n<p>      State-backed Russian\u00a0cyber criminals\u00a0are actively exploiting a recently-patched vulnerability in a series of VMware products in order to access sensitive corporate data.<br \/>\nVMware had previou&#8230;<\/p>\n","protected":false},"author":433,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[],"tags":[],"class_list":["post-41633","post","type-post","status-publish","format-standard","hentry"],"_links":{"self":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41633","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/users\/433"}],"replies":[{"embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/comments?post=41633"}],"version-history":[{"count":1,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41633\/revisions"}],"predecessor-version":[{"id":41634,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/posts\/41633\/revisions\/41634"}],"wp:attachment":[{"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/media?parent=41633"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/categories?post=41633"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/icloud.pe\/blog\/wp-json\/wp\/v2\/tags?post=41633"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}