VMware faces a critical remote execution of a vulnerability code in ESXi recently revealed in the Cup Tianfu hacking competition.
The Tianfu Cup 2019 International Cyber Security Competition was held in November, the white hat hackers participating in competition earned $ 545.000 for zero-day operating exploits.
Researcher @xiaowei from 360Vulcan received the highest reward ($ 200,000) for a functional exploit for the VMware vSphere ESXi product that allowed him to escape from the guest virtual machine to the host. The critical defect referred to as CVE-2019-5544 has been rated by CVSS 9,8.
Ο hacker was able to take control of the operating system host in 24 seconds.
According to VMware, the CVE-2019-5544 flaw is an automatic overwrite problem found in the OpenSLP application open source of the Location Service Protocol (SLP), which allows software to locate resources in one network.
OpenSLP as used in ESXi and Horizon DaaS devices has a "heap overwrite" issue. VMware has evaluated the severity of this issue and is at the top of the CVSSv3 9,8 top rated base. "The document with tips published by the company says.
VMware experts present at the contest received the details of the operation as soon as the expert showed attack.
According to VMware, the defect affects the 6.0, 6.5 and 6.7 versions of ESXi running on any platform and the Horizon cloud desktop-as-a-service (DaaS) version of 8.x.
The company has already fixed the issue for ESXi and is currently working on a solution for Horizon DaaS.
How useful was this post?
Average rating / 5. Vote count:
No votes so far! Be the first to rate this post.