VMware vulnerability CVE-2022-22954 threatened by ransomware, end of support for ESXi 6.5 & 6.7

Sicherheit (Pexels, allgemeine Nutzung)[German]Various VMware products contain the critical vulnerability CVE-2022-22954 , for which a security update was provided back in April 2022. I had addressed the vulnerability in the blog post Warning: critical vulnerabilities in VMware products (April 6, 2022).


Advertising

Critical vulnerability CVE-2022-22954

Various VMware products contain the critical vulnerability CVE-2022-22954 , for which a security update was already provided in April 2022. I had addressed the vulnerability in the German blog post Warnung: Kritische Schwachstellen in VMware-Produkten (6. April 2022) that this vulnerability was the focus of hackers installing a backdoor on unpatched VMware products. In a recent articleHackers exploit critical VMware flaw to drop ransomware, miners colleagues at Bleeping Computer warn against attacking the vulnerability.

Security researchers have observed new malicious campaigns that exploit the critical CVE-2022-22954 vulnerability in VMware Workspace One Access to spread various malware. Among them is the injection of the RAR1Ransom tool, which locks files in password-protected archives.

Fortinet security researchers discovered campaigns in which threat actors used the Mira botnet for distributed denial-of-service (DDoS) attacks, the GuardMiner cryptocurrency miner and the RAR1Ransom tool.

End of support for ESXi 6.5 & 6.7 servers

VMware's ESXi 6.5 & 6.7 Server products have reached the end of support, for example, as Lansweeper writes in the following tweet and in this article. It says that ESXi 6.5 and 6.7 will be out of general support on October 15, 2022.

EOL for ESXi 6.5 & 6.7 Server


Advertising

The Technical Guidance phase will run until November 15, 2023. However, VMware is offering 2 years of extended support for ESXi 6.5 and 6.7, which means you will be eligible for support until October 15, 2024. To receive continuous support, you must purchase extended support before the end of general support. This extended support does not include updates to third-party software packages. There will be no architectural improvements, performance enhancements, or feature enhancements. Security patches are limited to one roll-up per year.

Bleeping Computer writes here, that more than 45,000 VMware ESXi servers are affected by this end-of-life (EOL) and will now no longer receive software and security updates without extended support.

Migrate to XCP-ng/Xen Orchestra

The tweet above from xcp-ng.org use the end of support to promotes a switch to XCP-ng as a virtualization solution. In this article possible reasons for the switch include the new VMware licensing model and the recent acquisition by Broadcom are mentioned.


Cookies helps to fund this blog: Cookie settings
Advertising


##1

This entry was posted in Security, Software, Virtualization and tagged , . Bookmark the permalink.

Leave a Reply

Your email address will not be published. Required fields are marked *