Application security, Security Architecture, Breach, Risk Assessments/Management, Identity
VMware vulnerability exploited for Rocket Kitten attacks
Share
Iranian threat actor Rocket Kitten has been distributing the Core Impact penetration testing tool by exploiting a remote code execution flaw in VMware Workspace ONE Access and Identity Manager, which was already addressed by VMware early this month, The Hacker News reports.
Abusing the vulnerability, tracked as CVE-2022-22954, could help attackers obtain "an unlimited attack surface," indicating the highest privileged access to any virtualized host and guest environment components, according to a Morphisec report.
Researchers noted the Rocket Kitten has been delivering a PowerShell-based stager leveraged for the next-stage PowerTrash Loader that is then used to inject the Core Impact pen testing tool for future activity.
"The widespread use of VMWare identity access management combined with the unfettered remote access this attack provides is a recipe for devastating breaches across industries... VMWare customers should also review their VMware architecture to ensure the affected components are not accidentally published on the internet, which dramatically increases the exploitation risks," said researchers.
An In-Depth Guide to Application Security
Get essential knowledge and practical strategies to fortify your applications.
Related Events
Related Terms
BiometricsBritish Standard 7799BrowserChain of CustodyCompetitive IntelligenceCookieDLL InjectionData CustodianDiscretionary Access Control (DAC)Dynamic Link LibraryGet daily email updates
SC Media's daily must-read of the most current and pressing daily news