kb.vmware.com
Open in
urlscan Pro
2600:1400:d:499::2ef
Public Scan
URL:
https://kb.vmware.com/s/article/89619
Submission: On October 03 via manual from CA — Scanned from CA
Submission: On October 03 via manual from CA — Scanned from CA
Form analysis
0 forms found in the DOMText Content
Support Assistant Support Assistant * START OVER * END CHAT * PRIVACY POLICY SUPPORT ASSISTANT POWERED BY CONNECT AI Loading ×Sorry to interrupt This page has an error. You might just need to refresh it. [NoErrorObjectAvailable] Script error. Refresh COOKIE PREFERENCE CENTER GENERAL INFORMATION ON COOKIES GENERAL INFORMATION ON COOKIES When you visit our website, we use cookies to ensure that we give you the best experience. This information does not usually directly identify you, but it can give you a more personalized web experience. Because we respect your right to privacy, you can choose not to allow some types of cookies by clicking on the different category headings to find out more and change your settings. However, blocking some types of cookies may impact your experience on the site and the services we are able to offer. Further information can be found in our Cookie Policy. * STRICTLY NECESSARY STRICTLY NECESSARY Always Active Strictly Necessary Strictly necessary cookies are always enabled since they are essential for our website to function. They enable core functionality such as security, network management, and website accessibility. You can set your browser to block or alert you about these cookies, but this may affect how the website functions. For more information please visit www.aboutcookies.org or www.allaboutcookies.org. Cookie Details * PERFORMANCE PERFORMANCE Performance Performance cookies are used to analyze the user experience to improve our website by collecting and reporting information on how you use it. They allow us to know which pages are the most and least popular, see how visitors move around the site, optimize our website and make it easier to navigate. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * FUNCTIONAL FUNCTIONAL Functional Functional cookies help us keep track of your past browsing choices so we can improve usability and customize your experience. These cookies enable the website to remember your preferred settings, language preferences, location and other customizable elements such as font or text size. If you do not allow these cookies, then some or all of these services may not function properly. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * ADVERTISING ADVERTISING Advertising Advertising cookies are used to send you relevant advertising and promotional information. They may be set through our site by third parties to build a profile of your interests and show you relevant advertisements on other sites. These cookies do not directly store personal information, but their function is based on uniquely identifying your browser and internet device. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. * SOCIAL MEDIA SOCIAL MEDIA Social Media Social media cookies are intended to facilitate the sharing of content and to improve the user experience. These cookies can sometimes track your activities. We do not control social media cookies and they do not allow us to gain access to your social media accounts. Please refer to the relevant social media platform’s privacy policies for more information. Cookie Details PLEASE CONFIRM YOUR SETTINGS BY REFRESHING THE PAGE. Back Button ADVERTISING COOKIES Filter Button Consent Leg.Interest Select All Vendors Select All Vendors Select All Hosts Select All * REPLACE-WITH-DYANMIC-HOST-ID View Third Party Cookies * Name cookie name Clear Filters Information storage and access Apply Confirm My Choices Allow All Products and Accounts Knowledge Communities Support Learning Register Login SearchLoading My Subscriptions See What’s New What’s new in VMware Customer Connect Knowledgebase Product Downloads Product downloads are now searchable in KB search Search Improvements Search results have been enhanced with clickable product links to help with filtering Customer Connect Rebranding KB articles referring to the former MyVMware portal have been updated to reflect the redesigned and rebranded Customer Connect Portal Subscription Improvements Subscriptions page has been updated to make it easier to subscribe to KB articles based on products, categories and language in a more streamlined UI GOT IT Loading Knowledge Base MITIGATION AND THREAT HUNTING GUIDANCE FOR UNSIGNED VSPHERE INSTALLATION BUNDLES (VIBS) IN ESXI (89619) -------------------------------------------------------------------------------- Last Updated: 9/29/2022Categories: SecurityTotal Views: 20823 thumbs-up-line 7Language: English subscribe SYMPTOMS Details On Thursday September 29th, Mandiant published information on malware they discovered in the wild that leverages unsigned VIBs to install backdoors on a compromised ESXi host. It should be noted that a malicious actor must first obtain administrative privileges (root) on an ESXi host prior to installing a malicious VIB. Also, Mandiant found no evidence that a vulnerability in a VMware product was exploited to gain access to ESXi during their investigations. For information on operational security best practices, Mandiant’s findings, and general information about this disclosure please review our article entitled Protecting vSphere From Specialized Malware. This KB Article will focus on mitigation and threat hunting instructions for unsigned VIBs. RESOLUTION Mitigation In addition to implementing various operational security best practices mentioned in Protecting vSphere From Specialized Malware to prevent a potential compromise in the first place, VMware recommends enablement of the Secureboot feature in ESXi to mitigate the risk of malicious actors persisting on a compromised ESXi host via malicious VIB installation. Secure boot was designed to disallow installation of unsigned VIBs on an ESXi host. In addition, secure boot disallows the --force flag which would normally allow an administrator to bypass acceptance level settings on the ESXi host. To enable Secureboot perform the following steps: Please contact your hardware vendor for steps on how to enable UEFI / Secureboot for your system. Enabling Secureboot on ESXi: UEFI Secure Boot for ESXi Hosts (vmware.com) * Run the Secure boot validation script: /usr/lib/vmware/secureboot/bin/secureBoot.py -c - If 7.0 u2 or later and the host has a TPM, please see the following document: Enable or Disable the Secure Boot Enforcement for a Secure ESXi Configuration (vmware.com) Threat Hunting Concerned customers can perform the following instructions in order to audit their ESXi host(s) for unsigned VIBs. Download the following PowerCLI script Verify_ESXi_VIB_Signature.ps1 (attached to this KB) and run against your vCenter using the SSO admin credentials.. -Requirements: PowerCLI installed (Install PowerCLI (vmware.com) 443 access to vCenter where the script is running from Set the PowerShell Execution Policy to unsigned:Set the PowerShell Execution Policy to RemoteSigned (vmware.com) What to look for in the results: Example: Overall Status = Good: This host has no unsigned VIBs. Overall Status = Not Good: Unsigned VIBs were detected on the host. Note: 6.5 has a known issue which will show an unsigned VIB on the ESXi base. Please see the following KB:Unable to enable Secure Boot in ESXi 6.x (79790) (vmware.com) Note: CommunitySupported VIBs are not signed. CommuitySupported VIB’s require an ESXi host to be set to CommunitySupported acceptance level, which is not recommended. What should I do if I find unsigned VIBs in my environment? VMware does not recommend using unsigned VIBs but their presence does not definitively prove that an ESXi host has been compromised. VMware recommends that organizations attempt to determine the origin of any unsigned VIB(s) that are found on their ESXi hosts as it is possible that a trusted administrator may have intentionally installed the unsigned VIB(s) for a legitimate purpose. However, organizations who suspect a compromise may have occurred should follow their established incident response processes. For organizations who do not have an in-house Incident Response team, VMware provides a list of trusted partners who offer incident response services, please see: https://www.vmware.com/partners/work-with-partners/incident-response-and-managed-security-service-providers.html RELATED INFORMATION * Please follow KB Unable to enable Secure Boot in ESXi 6.x if esx-base VIB verification is failing with error "Failed to verify checksum for payload btldr: Not found" * Secure boot feature will verify the VIBs during the boot and will trigger a PSOD with following error if any Unsigned VIB is installed on the ESXi host. UEFI Secure Boot failed: Failed to verify signatures of the following vibs (XX) Detectable by VMware SkylineTM ACTIONS Copy To Clipboard Copy link to clipboard copied! Print Print Language Language: English ATTACHMENTS * KB89619_Verify_Unsigned_VIBs_on_ESXi_(ver_1.2) Additional Resources KB • Downloading and licensing vSphere Hypervisor (ESXi 6.x & 7.x) (2107518) Result 1 of 1 Ask The Community Get answers quickly from VMware experts in the community Post Subject CONTINUE IN COMMUNITIES Clear SearchLoading RELATED PRODUCTS: * VMware vSphere * VMware vSphere * ESXi RELATED VERSIONS: * Take Our Survey * * * * * Copyright © 2022 VMware, Inc. All rights reserved. * Terms of Use * Your California Privacy Rights * Privacy * Accessibility * Cookie Settings Loading