Context over chaos. Disconnected technologies, siloed data, and reactive processes can only get you so far. Protecting businesses in today’s threat landscape demands more than a set of security tools – it requires context.
That's where Avertium comes in
Security. It’s in our DNA. It’s elemental, foundational. Something that an always-on, everything’s-IoT-connected world depends on.
Helping mid-to-enterprise organizations protect assets and manage risk is our only business. Our mission is to make our customers’ world a safer place so that they may thrive in an always-on, connected world.
Best-in-class technology from our partners... backed by service excellence from Avertium.
Interested in becoming a partner?
With Avertium's deal registration, partners can efficiently and confidently connect with Avertium on opportunities to protect your deals.
Microsoft Copilot for Security analyzes and synthesizes high volumes of security data which can help healthcare cybersecurity teams do more with less.
Dive into our resource hub and explore top
cybersecurity topics along with what we do
and what we can do for you.
This report is about a vulnerability found in the VMWare ESXI software known as CVE-2020-3955. The vulnerability is caused by the improper validation of user-supplied inputs. The software flaw exists in VMWare ESXI versions 6.5 and 6.7 with patches available for both versions.
This vulnerability exists in the Virtual Machine Attribute Viewer in an unknown code block. The root cause seems to be the failure of the software to neutralize any HTML script before viewing the virtual machine attributes.
A remote attacker can exploit CVE-2020-3955 by injecting malicious code like an HTML file into a web page. When the web page is viewed by a potential victim, the script is run using the security context of the website targeting the victim’s web browser. The goal of this malicious script is to steal the victim’s authentication token found in the browser cookies.
Once the authentication cookie is successfully stolen, the bad actor can access the ESXI host with the privileges of the targeted user. The threat actor can then manipulate the ESXI host however they want and identify more potential targets.
Utilizing access to the hypervisor, the bad actor can modify a virtual machine and use it as a platform for lateral movement activities.
It is also possible that the bad actor may be able to inject an arbitrary HTML file into the website, allowing for the chance to engage in more attacks against other visitors.
The exploitation of this VMWare ESXI vulnerability could result in unauthorized access to a critical asset within the environment. This may lead to immense financial damages as the threat actor modifies and controls hosts on the network. Infiltration presents possible opportunities for the bad actor to abuse a user account on an environmental level depending on the network setup.
We recommend that you do the following to remediate VMWare ESXI vulnerability CVE-2020-3955:
VMWare Security Advisory patch link: https://www.vmware.com/security/advisories/VMSA-2020-0008.html
IBM X-Force Exchange: https://exchange.xforce.ibmcloud.com/vulnerabilities/180985
Supporting Documentation:
Note: The Avertium Threat Report analyzes one current threat that has been shared by threat intelligence networks across the globe. Used internally by the Avertium CyberOps Team, this report will outline a “top-of-mind” threat and how it ought to be addressed accordingly.
This informed analysis is based on the latest data available.
Contact us for more information about Avertium’s managed detection and response service capabilities.
Could your cybersecurity plan be all talk and no action? Contact Avertium today to schedule a free tabletop diagnostic, so you don’t have to find out the hard way.
Show No Weakness