vmware vulnerabilities

Threat Spotlight: Attempts to exploit new VMware vulnerabilities

Print Friendly, PDF & Email

Barracuda researchers analyzed the attacks and payloads detected by Barracuda systems between April to May and found a steady stream of attempts to exploit two recently uncovered VMware vulnerabilities: CVE-2022-22954 and CVE-2022-22960.

Here’s a closer look at one of these vulnerabilities (CVE-2022-22954), recent attack patterns, and solutions you can use to help protect against these types of attacks.

Highlighted Threat

New VMware vulnerabilities — On April 6, VMware published a security advisory that listed multiple security vulnerabilities. One of the most severe vulnerabilities in this advisory is a server-side template injection issue, CVE-2022-22954. This vulnerability has the effect of allowing an unauthenticated user with access to the web interface to execute any arbitrary shell command as the VMware user. The list of vulnerabilities also contained CVE-2022-22960, a local privilege escalation vulnerability in the affected products, which could possibly be chained by attackers.

VMware confirmed that exploitation of these vulnerabilities in the wild was already occurring. CVE-2022-22954 has a CVSS score of 9.8, and CVE-2022-22960 has a CVSS score of 7.8.

Barracuda researchers started seeing probes and exploit attempts for this vulnerability soon after the release of the advisory and the initial release of the proof of concept on GitHub. The attacks have been consistent over time, barring a few spikes, and the vast majority of them are what would be classified as probes rather than actual exploit attempts.

VMware vulnerabilities

The vast majority of the attacks came in from the U.S. geographically, with most of them coming in from data centers and cloud providers. While the spikes are largely from these IP ranges, there are also consistent background attempts from known bad IPs in Russia. Some of these IPs perform scans for specific vulnerabilities at regular intervals, and it looks like the VMware vulnerabilities have been added to their usual rotating list of Laravel/Drupal/PHP probes.

Attacker IPs

The Details

The most common payload seen was this attempt at injecting “cat/etc/password”

vmware RCE vulnerabilities

Which decodes to:

VMware RCE vulnerabilities

The proof of concept for the vulnerability published on GitHub by sherlocksecurity was the next most popular one for probing. This string was discovered in various probes that were trying to check for exploitability:

vmware vulnerability

Some of the payload strings using this script were:

vmware vulnerability

(This is the default starting from the proof-of-concept script.)

vmware vulnerability

There were also some attempts to use base64-encoded versions of the probes:

vmware vulnerability

Which decoded to:

vulnerability

Among other probes, there were also many probes happening with callbacks. For example:

vmware vulnerability

In terms of actual exploit attempts, the exploits were primarily from botnet operators.

One of the payloads seen was this:

vmwarevulnerability

Which decodes to:

vmware vulnerability

The payload that was seen in this example is currently offline; however, the IP still seems to be hosting variants of the Mirai DDoS botnet malware on it currently.

vulnerabilities

Some Log4Shell exploit attempts were also seen in the data:

vmware vulnerability

malware urls

We also saw low levels of EnemyBot attempts in the data:

 

While this specific sample went offline quite soon, the IP used in this attack seems fairly prolific as evidenced in this GreyNoise entry:

greynoise

How to protect against these types of attacks

As noted earlier, the interest levels on these vulnerabilities have stabilized. We’ll probably see low-level scanning and attempts to exploit them for some time, though. Even if scans and exploits remain steady, it’s important to take steps to protect your systems.

  • Patching — The ideal time to patch is now, especially if the system is internet-facing in any way.
  • Web application firewall —Place a web application firewall in front of such systems will add to defense in depth against zero-day attacks and other vulnerabilities, including Log4Shell.

E-book: The new ABCs of application security

Scroll to top
Tweet
Share
Share