Security researchers double-down on the need to patch VMware ESXi servers

0
259

Security teams should redouble efforts to patch the two-year-old VMware ESXi server vulnerability that reportedly hit thousands of VMware customers worldwide with ransomware attacks.

According to a March 20 blog post from AT&T Cybersecurity, organizations that have not run the patch are at risk of becoming a victim of the latest ransomware.

Nearly 3,200 VMware ESXi servers worldwide were compromised in the ransomware campaign — dubbed as ESXiArgs — according to a Censys search. France was the most affected country, followed by the United States, Germany and Canada.

At the time the news of ESXiArgs broke in early February, a VMware spokesperson said given that a patch for the vulnerability — CVE-2021-21974 — was made available in February 2021, customers should immediately apply it if they have not done so.

A VMware spokesperson issued a statement Monday: “The recent ransomware attacks on out-of-date software were yet another reminder that virtual infrastructure must be proactively hardened against cyber threats. VMware continues to remind customers how to harden their on-premises instances of vSphere, install updates without down-time, and better configure ESXi to defend…

Read More…