Security News > 2022 > June > Attackers still exploit Log4Shell on VMware Horizon servers, CISA warns
If your organization is running VMware Horizon and Unified Access Gateway servers and you haven't implemented the patches or workarounds to fix/mitigate the Log4Shell vulnerability in December 2021, you should threat all those systems as compromised, the Cybersecurity and Infrastructure Security Agency has advised on Thursday.
According to the CISA, cyber threat actors, including state-sponsored advanced persistent threat actors, have continued to exploit Log4Shell in unpatched, internet-facing VMware Horizon and Unified Access Gateway servers to obtain initial access to organizations.
"As part of this exploitation, suspected APT actors implanted loader malware on compromised systems with embedded executables enabling remote command and control. In one confirmed compromise, these APT actors were able to move laterally inside the network, gain access to a disaster recovery network, and collect and exfiltrate sensitive data," CISA noted, and detailed both engagements - one of which ended up with them discovering that the victim organization was compromised by multiple threat actor groups.
One of these groups also leveraged CVE-2022-22954, a RCE vulnerability in VMware Workspace ONE Access and Identity Manager, to implant a webshell.
CISA advises organizations to assume that all their unpatched VMware Horizon and Unified Access Gateway servers are compromised and go from there.
"Minimize the internet-facing attack surface by hosting essential services on a segregated demilitarized zone, ensuring strict network perimeter access controls, and implementing regularly updated web application firewalls in front of public-facing services," CISA also counsels.
News URL
https://www.helpnetsecurity.com/2022/06/24/log4shell-vmware-horizon/
Related news
- CISA: Hackers abuse F5 BIG-IP cookies to map internal servers (source)
- VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability (source)
- VMware fixes critical vCenter Server RCE bug – again! (CVE-2024-38812) (source)
- VMware fixes bad patch for critical vCenter Server RCE flaw (source)
- Exploit released for new Windows Server "WinReg" NTLM Relay attack (source)
- Week in review: Fortinet patches critical FortiManager 0-day, VMware fixes vCenter Server RCE (source)
- Critical RCE bug in VMware vCenter Server now exploited in attacks (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2022-04-11 | CVE-2022-22954 | Code Injection vulnerability in VMWare products VMware Workspace ONE Access and Identity Manager contain a remote code execution vulnerability due to server-side template injection. | 9.8 |