Vulnerability Management, Cloud Security, Application security
Active attacks exploiting old bugs in VMware NSX Manager spike

Companies that use VMware NSX Manager typically require a high level of security for their network infrastructure, including financial sector, healthcare, and federal agencies ("VMware headquarters" by Ferran Rodenas is licensed under CC BY-NC-SA 2.0)
Ongoing attacks attempting to exploit critical vulnerabilities in VMware NSX Manager are on the upswing, with 40,000 reported attempts over the last two months, researchers warn. The flaws are not new, however API security firm Wallarm found that unprotected and compromised systems could lead to “catastrophic” consequences, allowing attackers to execute arbitrary code, steal data and take control of network infrastructure.The two bugs (CVE-2021-39144 and CVE-2022-31678) work in tandem, allowing adversaries to compromise unpatched VMware NSX systems, said Wallarm in a Monday report."Active exploitation started on 2022-Dec-08 and keeps going,” Wallarm said. "Attackers are scanning from well-known data centers like Linode and Digital Ocean - Over 90 percent of the attacks are coming from their IP addresses." First identified by Source Incite and patched by VMware in October 2022, the vulnerabilities target VMware NSX Manager, used for network virtualization and security. Raising the stakes for the vulnerabilities are the typical customers of VMware’s NSX systems. “Companies that use VMware NSX Manager typically require a high level of security for their network infrastructure. This includes businesses in the financial sector, healthcare, retail [and] ecommerce, and government agencies,” Wallarm said.
An In-Depth Guide to Cloud Security
Get essential knowledge and practical strategies to fortify your cloud security.
Related Events
Get daily email updates
SC Media's daily must-read of the most current and pressing daily news
You can skip this ad in 5 seconds