An ESXi hypervisor, also called a virtual machine monitor, is a virtualisation tool developed by VMware, for creating and managing virtual machines on a single physical server.
There has been a new wave of attacks targeting ERXi hypervisors. There has been a new wave of attacks targeting ERXi hypervisors. Vulnerability CVE-2021-21974 allows a remote attacker to bypass the ESXi security mechanisms and execute malicious code, in particular data encryption.
This vulnerability affects ESXi versions prior to version 7.X ESXi70U1c-17325551, 6.7.X ESXi670-202102401-SG, and 6.5.X ESXi650-202102101-SG. It also affects the “Service Location Protocol (SLP)” service.
Fortunately, exploits have been available for more than one year and a security patch has been available since February 2021.