DETECTION OVERVIEW
Risk Factors
This vCenter vulnerability is well known and requires network access to port 443 on a vCenter server. An unauthenticated attacker can leverage public exploit code to gain complete control of a device or escalate privileges to spread malware, such as ransomware, across the network.
Category

VMware vCenter Server enables the management of virtual environments for Windows and Linux hosts. The Analytics service in vCenter has a vulnerability that allows an unauthenticated attacker to bypass a proxy and access restricted endpoints on port 443. The attacker sends unauthenticated web requests where the URI contains a path traversal fragment (such as ../ or %252E%252E%252F), the restricted endpoint path (/analytics/ph/api/dataapp/agent), and a malicious web shell (1). The vulnerable vCenter sends a response to indicate that the malicious POST request was accepted (2). The attacker can now run commands on the compromised server by making additional requests to the web shell on the server.
ExtraHop spoke to three leading cyber intelligence experts to refine its forecast for RaaS royalty in 2025.
The 2025 ExtraHop Global Threat Landscape Report examines the expanding attack surface and evolving tactics being used by threat actors
If you think ransomware is bad now, cybersecurity experts warn it’s only going to get worse as 2024 wears on and the US general election approaches. Tile description:
Network analysis and visibility solutions remain underrepresented in enterprises. Find out why in this preview of a new Wave report.
ExtraHop® Named a Leader in First-Ever Gartner® Magic Quadrant™ for Network Detection and Response
Visit this resource for more information.
This analysis exposes the critical link between an organization's lack of internal visibility and the escalating cost of compromise, demanding an urgent re-evaluation of how core business assets are protected.
Learn why you need to be wary of the claims certain network detection and response providers make about their coverage against the MITRE ATT&CK framework.
Learn how NDR from RevealX helps security teams detect and investigate more adversary TTPs in the MITRE ATT&CK framework than rule-based tools.
