Both VMware and Microsoft have declined to comment about #ESXicape, when asked about number of victims and who has the exploit.
Does anybody know anybody at VMware Security who could have a look at the #ESXicape knowledge base article please?
It's missing 6.5 and 6.7, which are definitely vulnerable and have patches available on Broadcom's site. They're also listed in the VMware Github advisory, but have been missed off the support site. It's causing people to not patch.
I wrote up everything I know about #ESXicape https://doublepulsar.com/use-one-virtual-machine-to-own-them-all-active-exploitation-of-esxicape-0091ccc5bdfc
Quick mspaint.exe diagram on this, calling it ESXicape
- Have access to something like a Windows 11 Virtual Desktop system in VMware, or a Linux box or some such?
- Use ESXicape, a chain of three zero days, to gain access to the ESXi Hypervisor.
- Use that to access every other VM, and be on the management network of VMware cluster
One you have this level of access, traditionally you'll see groups like ransomware actors steal files and wipe things.