😳 Keep your servers patched!


A global ransomware attack has hit thousands of servers running the VMware ESxi hypervisor, with many more servers expected to be affected, according to national cybersecurity agencies and security experts around the world.

The attack campaign exploits the CVE-2021-21974 vulnerability, for which a patch has been available since February 23, 2021. This vulnerability affects the Service Location Protocol (SLP) service and allows attackers to exploit arbitrary code remotely. The systems currently targeted are ESXi hypervisors in version 6.x, prior to 6.7.

The take away here being to ensure that your ESXi servers are patched regularly. This patch has been available for almost two years now, so if you find yourself a victim, shame on you!

About the Author

Nizam Mohamed

Nizam Mohamed is a technical architect, specialising in cloud solutions, virtualization and end-user computing. Other technology interests include Enterprise Technologies, Cybersecurity and Enterprise Desktop Management.

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

You may also like these