Why Joining VMware ESXi to Active Directory is a Ransomware Invitation

Joining your VMware ESXi hypervisor to Active Directory? Recent Microsoft warnings suggest you rethink that. The CVE-2024-37085 vulnerability could let attackers create AD groups and gain full control of your ESXi hypervisor. Ransomware groups are already exploiting this, so patch up and protect your credentials!

Hot Take:

Well, if you’ve ever thought joining your VMware ESXi hypervisor to Active Directory was like inviting a vampire into your house, congratulations! You’re right. And now there’s a CVE to prove it. So, if you’ve got a love for chaos and ransomware, by all means, keep that door wide open. Otherwise, you might want to patch up and reconsider your life choices.

Key Points:

  • CVE-2024-37085 is a newly patched vulnerability affecting VMware ESXi hypervisors joined to Active Directory.
  • The vulnerability allows for full admin control of ESXi hypervisors via creation or renaming of an “ESX Admins” AD group.
  • Ransomware groups like Black Basta, Akira, Medusa, and Octo Tempest have been actively exploiting this flaw.
  • Microsoft and Broadcom have both issued advisories and patches, though criticism abounds on the severity rating.
  • Admins are advised to patch immediately and review their AD and ESXi configurations to avoid potential exploits.

Membership Required

 You must be a member to access this content.

View Membership Levels
Already a member? Log in here