¡¾·ì϶¹«¸æ¡¿VMware ESXi Active Directory¼¯³ÉÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶ (CVE-2024-37085)
°ä²¼¹¦·ò 2024-07-30Ò»¡¢·ì϶¸ÅÊö
·ìϼûû³Æ | VMware ESXi Active Directory¼¯³ÉÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶ | ||
CVE ID | CVE-2024-37085 | ||
·ì϶ÀàÐÍ | Éí·ÝÑéÖ¤ÈÆ¹ý | ·¢ÏÖ¹¦·ò | 2024-06-26 |
·ì϶ÆÀ·Ö | 6.8 | ·ì϶µÈ¼¶ | ÖÐΣ |
¹¥»÷ÏòÁ¿ | ÍøÂç | ËùÐèȨÏÞ | ¸ß |
ÀûÓÃÄÑ¶È | µÍ | Óû§½»»¥ | ÊÇ |
PoC/EXP | δ¹«¿ª | ÔÚÒ°ÀûÓà | ÒÑ·¢ÏÖ |
VMware ESXiÊÇVMware¹«Ë¾¿ª·¢µÄÒ»ÖÖÐé¹¹»¯²Ù×÷ϵͳ£¬ËüÊÇVMware vSphereÐé¹¹»¯Æ½Ì¨ÖеÄÖ÷Ìâ×é¼þÖ®Ò»£¬±»¿í·ºÀûÓÃÓÚÆóÒµÊý¾ÝÖÐÐĺÍÔÆÍÆËã»·¾³£¬Ô®ÊÖ×é֯ʵÏÖÐé¹¹»¯¡¢¼¯ÖÐÖÎÀíºÍ×ÊÔ´¹²Ïí£¬Ìá¸ßITÖÎÀíЧÄܺͽýÝÐÔ¡£
7ÔÂ30ÈÕ£¬GA»Æ½ð¼×¼¯ÍÅVSRC¼à²âµ½¶à¸öÀÕË÷Èí¼þÍÅ»ïÔÚ»ý¼«ÀûÓÃVMware ESXiÖеÄÒ»¸öÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¨CVE-2024-37085£©£¬ÒÔ»ñÈ¡²ÎÓëÓòµÄ ESXi Ðé¹¹»úÖÎÀí·¨Ê½µÄÆëÈ«ÖÎÀíȨÏÞ£¬¸Ã·ì϶µÄCVSSÆÀ·ÖΪ6.8¡£
VMware ESXi ´æÔÚActive Directory£¨AD£©¼¯³ÉÉí·ÝÑéÖ¤ÈÆ¹ý·ì϶£¬¸Ã·ì϶´æÔÚÓÚ²ÎÓëÓòµÄ ESXi Ðé¹¹»úÖÎÀí·¨Ê½´¦ÖÃÓò×éµÄ·½Ê½ÖУ¬Ä¬ÈÏÇé¿öÏÂÃûΪ¡°ESX Admins¡±µÄÓò×éÖеÄÈκγÉÔ±³ÇÊÐ×Ô¶¯»ñµÃ ESXi ·þÎñÆ÷ÉÏµÄÆëÈ«ÖÎÀíȨÏÞ£¬¶øÎÞÐè¾¹ýÉí·ÝÑéÖ¤£¬ÍþвÕß¿Éͨ¹ý´´½¨»ò°Ñ³Ö¸Ã×éÀ´»ñµÃδÊÚȨ½Ó¼û¡£³É¹¦ÀûÓø÷ì϶¿ÉÄܵ¼Ö ESXi Îļþϵͳ±»¼ÓÃÜ¡¢½ûÓÃËùÓÐÍйÜÐé¹¹»ú (VM)£¬·ÛË鹨¼üÒµÎñÔËÓª£¬²¢¿ÉÄÜÇÔÈ¡Êý¾Ý»òÔÚÍøÂçÄÚºáÏòÒÆ¶¯¡£
¶þ¡¢Ó°ÏìÁìÓò
VMware ESXi 8.0
VMware ESXi 7.0
VMware Cloud Foundation 5.x
VMware Cloud Foundation 4.x
Èý¡¢°²È«´ëÊ©
3.1 Éý¼¶°æ±¾
ĿǰVmwareÒÑÕë¶Ô²¿ÃÅÊÜÓ°Ïì²úÆ·°ä²¼Á˲¹¶¡£¬ÊÜÓ°ÏìÓû§¿ÉÉý¼¶µ½ÒÔϰ汾£º
VMware ESXi 8.0 £ºÉý¼¶µ½ESXi80U3-24022510
VMware ESXi 7.0£ºÔÝÎÞ
VMware Cloud Foundation 5.x£ºÉý¼¶µ½5.2
VMware Cloud Foundation 4.x£ºÔÝÎÞ
ÏÂÔØÁ´½Ó£º
https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-esxi-803-release-notes/index.html
3.2 һʱ´ëÊ©
l ÑéÖ¤×é¡°ESX Admins¡±ÊÇ·ñ´æÔÚÓÚÓòÖС£
l ͨ¹ý¸ü¸Ä ESXi Ðé¹¹»úÖÎÀí·¨Ê½×ÔÉíµÄÉèÖÃÀ´ÊÖ¶¯»Ø¾ø¸Ã×éµÄ½Ó¼û¡£ÈôÊDz»±ØÒªActive Directory ESX admins×éµÄÆëÈ«ÖÎÀí½Ó¼ûȨÏÞ£¬Äܹ»Ê¹Óø߼¶Ö÷»úÉèÖá®Config.HostAgent.plugins.hostsvc.esxAdminsGroupAutoAdd¡¯½ûÓôËÐÐΪ¡£
l ½«ÖÎÀí×é¸ü¸ÄΪ ESXi Ðé¹¹»úÖÎÀí·¨Ê½ÖÐµÄÆäËû×é¡£
l ÔÚ XDR/SIEM ÖÐΪÐÂ×éÃûÔö³¤×Ô½ç˵¼ì²â¡£
l ÅäÖý«ESXiÈÕÖ¾·¢Ë͵½SIEMϵͳ²¢¼à¿Ø¿ÉÒɵįëÈ«ÖÎÀí½Ó¼û¡£
3.3 ͨÓý¨Òé
l ¶¨ÆÚ¸üÐÂϵͳ²¹¶¡£¬Ï÷¼õϵͳ·ì϶£¬ÌáÉý·þÎñÆ÷µÄ°²È«ÐÔ¡£
l ¼ÓǿϵͳºÍÍøÂçµÄ½Ó¼û½ÚÔ죬Åú¸Ä·À»ðǽսÊõ£¬¹Ø¹Ø·Ç±ØÒªµÄÀûÓö˿ڻò·þÎñ£¬Ï÷¼õ½«Î£ÏÕ·þÎñ£¨ÈçSSH¡¢RDPµÈ£©Â¶³öµ½¹«Íø£¬Ï÷¼õ¹¥»÷Ãæ¡£
l ʹÓÃÆóÒµ¼¶°²È«²úÆ·£¬ÌáÉýÆóÒµµÄÍøÂ簲ȫ»úÄÜ¡£
l ¼ÓǿϵͳÓû§ºÍȨÏÞÖÎÀí£¬ÆôÓöà³É·ÖÈÏÖ¤»úÔìºÍ×îÓ×ȨÏÞ×¼Ôò£¬Óû§ºÍÈí¼þȨÏÞӦά³ÖÔÚ×îµÍÏÞ¶È¡£
l ÆôÓÃÇ¿ÃÜÂëÕ½Êõ²¢ÉèÖÃΪ¶¨ÆÚÅú¸Ä¡£
3.4 ²Î¿¼Á´½Ó
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24505
https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/
ËÄ¡¢°æ±¾ÐÅÏ¢
°æ±¾ | ÈÕÆÚ | ±¸×¢ |
V1.0 | 2024-07-30 | ³õ´Î°ä²¼ |
Îå¡¢¸½Â¼
5.1 GA»Æ½ð¼×¼ò½é
GA»Æ½ð¼×³ÉÁ¢ÓÚ1996Ä꣬ÊÇÓÉÁôÃÀ²©Ê¿ÑÏÍû¼ÑŮʿ´´½¨µÄ¡¢Õ¼ÓÐÆëÈ«×ÔÖ÷֪ʶ²úȨµÄÐÅÏ¢°²È«¸ß¿Æ¼¼ÆóÒµ¡£ÊǹúÄÚ×î¾ßʵÁ¦µÄÐÅÏ¢°²È«²úÆ·¡¢°²È«·þÎñ½â¾ö¹æ»®µÄÁ캽ÆóÒµÖ®Ò»¡£
¹«Ë¾×ܲ¿Î»ÓÚ±±¾©ÊÐÖйشåÈí¼þÔ°GA»Æ½ð¼×´óÏ㬹«Ë¾Ô±¹¤6000ÓàÈË£¬Ñз¢ÍŶÓ1200ÓàÈË, ¼¼Êõ·þÎñÍŶÓ1300ÓàÈË¡£ÔÚÈ«¹ú¸÷Ê¡¡¢ÊÓ×¢×ÔÖÎÇøÉèÁ¢·ÖÖ§»ú¹¹ÁùÊ®¶à¸ö£¬Õ¼Óи²¸ÇÈ«¹úµÄÏúÊÛϵͳ¡¢Çþ·ϵͳºÍ¼¼ÊõÖ§³Öϵͳ¡£¹«Ë¾ÓÚ2010Äê6ÔÂ23ÈÕÔÚÉîÛÚÖÐÓ×°å¹ÒÅÆÉÏÊС££¨¹ÉƱ´úÂ룺002439£©
¶àÄêÀ´£¬GA»Æ½ð¼×ÖÂÁ¦ÓÚÌṩӵÓйú¼Ê¾ºÕùÁ¦µÄ×ÔÖ÷´´Ðµİ²È«²úÆ·ºÍ×î¼Ñʵ¼Ê·þÎñ£¬Ô®ÊÖ¿Í»§È«ÃæÌáÉýÆäIT»ù´¡ÉèÊ©µÄ°²È«ÐԺͳö²úЧÁ¦£¬Îª´òÔìºÍÌáÉý¹ú¼Ê»¯µÄÃñ×åÐÅÏ¢°²È«²úÒµÁì¾üÆ·ÅÆ¶ø²»Ð¸ÖÂÁ¦¡£
5.2 ¹ØÓÚGA»Æ½ð¼×
GA»Æ½ð¼×°²È«Ó¦¼±ÏìÓ¦ÖÐÐÄÒѰ䲼1000¶à¸ö·ì϶¹«¸æÎ¢·çÏÕÔ¤¾¯£¬ÎÒÃǽ«³ÖÐø¸ú×ÙÈ«Çò×îеÄÍøÂ簲ȫÊÂÎñºÍ·ì϶£¬ÎªÆóÒµµÄÐÅÏ¢°²È«±£¼Ý»¤º½¡£
¹Ø×¢ÎÒÃÇ£º



¾©¹«Íø°²±¸11010802024551ºÅ