¡¾Â©¶´Í¨¸æ¡¿VMware ESXi Active Directory¼¯³ÉÉí·ÝÑéÖ¤ÈÆ¹ý©¶´ (CVE-2024-37085)
Ðû²¼Ê±¼ä 2024-07-30Ò»¡¢Â©¶´¸ÅÊö
©¶´Ãû³Æ | VMware ESXi Active Directory¼¯³ÉÉí·ÝÑéÖ¤ÈÆ¹ý©¶´ | ||
CVE ID | CVE-2024-37085 | ||
©¶´ÀàÐÍ | Éí·ÝÑéÖ¤ÈÆ¹ý | ·¢ÏÖʱ¼ä | 2024-06-26 |
©¶´ÆÀ·Ö | 6.8 | ©¶´Æ·¼¶ | ÖÐΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ¸ß |
ÀûÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ÊÇ |
PoC/EXP | δ¹ûÈ» | ÔÚÒ°ÀûÓà | ÒÑ·¢ÏÖ |
VMware ESXiÊÇVMware¹«Ë¾¿ª·¢µÄÒ»ÖÖÐéÄ⻯²Ù×÷ϵͳ£¬ËüÊÇVMware vSphereÐéÄ⻯ƽ̨ÖеĺËÐÄ×é¼þÖ®Ò»£¬±»¹ã·ºÓ¦ÓÃÓÚÆóÒµÊý¾ÝÖÐÐĺÍÔÆ¼ÆËã»·¾³£¬×ÊÖú×é֯ʵÏÖÐéÄ⻯¡¢¼¯ÖйÜÀíºÍ×ÊÔ´¹²Ïí£¬Ìá¸ßIT¹ÜÀíЧÂʺÍÁé»îÐÔ¡£
7ÔÂ30ÈÕ£¬¶«Éƽ̨¼¯ÍÅVSRC¼à²âµ½¶à¸öÀÕË÷Èí¼þÍÅ»ïÕýÔÚ»ý¼«ÀûÓÃVMware ESXiÖеÄÒ»¸öÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¨CVE-2024-37085£©£¬ÒÔ»ñÈ¡¼ÓÈëÓòµÄ ESXi ÐéÄâ»ú¹ÜÀí·¨Ê½µÄÍêÈ«¹ÜÀíȨÏÞ£¬¸Ã©¶´µÄCVSSÆÀ·ÖΪ6.8¡£
VMware ESXi ´æÔÚActive Directory£¨AD£©¼¯³ÉÉí·ÝÑéÖ¤ÈÆ¹ý©¶´£¬¸Ã©¶´´æÔÚÓÚ¼ÓÈëÓòµÄ ESXi ÐéÄâ»ú¹ÜÀí·¨Ê½´¦ÖÃÓò×éµÄ·½Ê½ÖУ¬Ä¬ÈÏÇé¿öÏÂÃûΪ¡°ESX Admins¡±µÄÓò×éÖеÄÈκγÉÔ±¶¼ÊÐ×Ô¶¯»ñµÃ ESXi ·þÎñÆ÷ÉϵÄÍêÈ«¹ÜÀíȨÏÞ£¬¶øÎÞÐè¾¹ýÉí·ÝÑéÖ¤£¬ÍþвÕß¿Éͨ¹ý´´½¨»òÀûÓøÃ×éÀ´»ñµÃδÊÚȨ·ÃÎÊ¡£ÀÖ³ÉÀûÓøÃ©¶´¿ÉÄܵ¼Ö ESXi Îļþϵͳ±»¼ÓÃÜ¡¢½ûÓÃËùÓÐÍйÜÐéÄâ»ú (VM)£¬ÆÆ»µÒªº¦ÒµÎñÔËÓª£¬²¢¿ÉÄÜÇÔÈ¡Êý¾Ý»òÔÚÍøÂçÄÚºáÏòÒÆ¶¯¡£
¶þ¡¢Ó°Ï췶Χ
VMware ESXi 8.0
VMware ESXi 7.0
VMware Cloud Foundation 5.x
VMware Cloud Foundation 4.x
Èý¡¢Äþ¾²´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰVmwareÒÑÕë¶Ô²¿ÃÅÊÜÓ°Ïì²úÎïÐû²¼Á˲¹¶¡£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
VMware ESXi 8.0 £ºÉý¼¶µ½ESXi80U3-24022510
VMware ESXi 7.0£ºÔÝÎÞ
VMware Cloud Foundation 5.x£ºÉý¼¶µ½5.2
VMware Cloud Foundation 4.x£ºÔÝÎÞ
ÏÂÔØÁ´½Ó£º
https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-esxi-803-release-notes/index.html
3.2 ÁÙʱ´ëÊ©
l ÑéÖ¤×é¡°ESX Admins¡±ÊÇ·ñ´æÔÚÓÚÓòÖС£
l ͨ¹ý¸ü¸Ä ESXi ÐéÄâ»ú¹ÜÀí·¨Ê½×Ô¼ºµÄÉèÖÃÀ´ÊÖ¶¯¾Ü¾ø¸Ã×éµÄ·ÃÎÊ¡£Èç¹û²»ÐèÒªActive Directory ESX admins×éµÄÍêÈ«¹ÜÀí·ÃÎÊȨÏÞ£¬¿ÉÒÔʹÓø߼¶Ö÷»úÉèÖá®Config.HostAgent.plugins.hostsvc.esxAdminsGroupAutoAdd¡¯½ûÓôËÐÐΪ¡£
l ½«¹ÜÀí×é¸ü¸ÄΪ ESXi ÐéÄâ»ú¹ÜÀí·¨Ê½ÖÐµÄÆäËû×é¡£
l ÔÚ XDR/SIEM ÖÐΪÐÂ×éÃûÌí¼Ó×Ô½ç˵¼ì²â¡£
l ÅäÖý«ESXiÈÕÖ¾·¢Ë͵½SIEMϵͳ²¢¼à¿Ø¿ÉÒɵÄÍêÈ«¹ÜÀí·ÃÎÊ¡£
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬¼õÉÙϵͳ©¶´£¬ÌáÉý·þÎñÆ÷µÄÄþ¾²ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ·ÃÎÊ¿ØÖÆ£¬Ð޸ķÀ»ðǽ¼ÆÄ±£¬¹Ø±Õ·ÇÐëÒªµÄÓ¦Óö˿ڻò·þÎñ£¬¼õÉÙ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Ì»Â¶µ½¹«Íø£¬¼õÉÙ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶Äþ¾²²úÎÌáÉýÆóÒµµÄÍøÂçÄþ¾²ÐÔÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞ¹ÜÀí£¬ÆôÓöàÒòËØÈÏÖ¤»úÖÆºÍ×îСȨÏÞÔÔò£¬Óû§ºÍÈí¼þȨÏÞÓ¦±£³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂë¼ÆÄ±²¢ÉèÖÃΪ¶¨ÆÚÐ޸ġ£
3.4 ²Î¿¼Á´½Ó
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505
https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2024-07-30 | Ê×´ÎÐû²¼ |
Îå¡¢¸½Â¼
5.1 ¶«Éƽ̨¼ò½é
¶«Éƽ̨½¨Á¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢ÓµÓÐÍêÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢Äþ¾²¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢Äþ¾²²úÎï¡¢Äþ¾²·þÎñ½â¾ö·½°¸µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°¶«Éƽ̨´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊС¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬ÓµÓÐÁýÕÖÈ«¹úµÄÏúÊÛÌåϵ¡¢ÇþµÀÌåϵºÍ¼¼ÊõÖ§³ÖÌåϵ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐС°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬¶«Éƽ̨ÖÂÁ¦ÓÚÌṩ¾ßÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´ÐµÄÄþ¾²²úÎïºÍ×î¼Ñʵ¼ù·þÎñ£¬×ÊÖú¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄÄþ¾²ÐÔºÍÉú²úЧÄÜ£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢Äþ¾²¹¤ÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸Å¬Á¦¡£
5.2 ¹ØÓÚ¶«Éƽ̨
¶«Éƽ̨Äþ¾²Ó¦¼±ÏìÓ¦ÖÐÐÄÒÑÐû²¼1000¶à¸ö©¶´Í¨¸æºÍ·çÏÕÔ¤¾¯£¬ÎÒÃǽ«Á¬Ðø¸ú×ÙÈ«Çò×îеÄÍøÂçÄþ¾²Ê¼þºÍ©¶´£¬ÎªÆóÒµµÄÐÅÏ¢Äþ¾²±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º