Get the latest tech news
Threat posed by new VMware hyperjacking vulnerabilities is hard to overstate
Just one compromised VM can make all other VMs on that hypervisor sitting ducks.
“If you can escape to the hypervisor, all bets are off as a boundary is broken.” He added: “With this vuln you’d be able to use it to traverse VMware managed hosting providers, private clouds orgs have built on prem etc.” The exploitation of vulnerabilities in virtual machine software has been one of the most common ways threat actors working for both nation-states and crime syndicates have gained entry into some of the world’s most sensitive networks. Dan Goodin is Senior Security Editor at Ars Technica, where he oversees coverage of malware, computer espionage, botnets, hardware hacking, encryption, and passwords.
Or read this on ArsTechnica