


Perceptive Security
SOC/SIEM Consultancy

VMware ESXi zero-days likely exploited a year before disclosure
Published:
8 januari 2026 om 21:27:19
Alert date:
8 januari 2026 om 22:02:23
Source:
bleepingcomputer.com
Cloud & Virtualization, Zero-Day Vulnerabilities, Network Infrastructure
Chinese-speaking threat actors exploited VMware ESXi zero-day vulnerabilities using an exploit toolkit that was developed more than a year before the vulnerabilities were publicly disclosed. The attackers gained initial access through a compromised SonicWall VPN appliance and used this to deliver the ESXi exploit toolkit. This indicates the vulnerabilities were known and actively exploited by threat actors well before VMware and the security community became aware of them. The extended timeline between exploitation and disclosure highlights the sophistication of the threat actors and their ability to maintain operational security while conducting long-term campaigns.
Technical details
Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit. The attack involved a sophisticated virtual machine escape exploiting three VMware vulnerabilities. The exploit toolkit included MAESTRO (exploit.exe) for coordinating VM escape, MyDriver.sys unsigned kernel driver for executing VM escape, VSOCKpuppet ELF backdoor for ESXi host access, and GetShell Plugin for Windows VSOCK client connection. PDB paths in exploit binaries contained folders named '2024_02_19' and '2023_11_02', suggesting development dates well before public disclosure. The attack chain involved disabling VMware VMCI devices, loading unsigned exploit driver via KDU, VMX memory leakage and corruption, sandbox escape, and deployment of hypervisor backdoor.
Mitigation steps:
Apply the latest ESXi security updates
Use provided YARA and Sigma rules for early detection
Monitor for VM escape attempts and VMCI device manipulation
Review SonicWall VPN appliance security and access logs
Affected products:
VMware ESXi 8.0 Update 3
SonicWall VPN appliances
Related links:
Related CVE's:
Related threat actors:
IOC's:
exploit.exe (MAESTRO), MyDriver.sys, client.exe (GetShell Plugin), VSOCKpuppet ELF backdoor, PDB path: C:\Users\test\Desktop\2024_02_19\全版本逃逸--交付\report\ESXI_8.0u3\, PDB path: C:\Users\test\Desktop\2023_11_02\vmci_vm_escape\getshell\source\client\x64\Release\client.pdb
This article was created with the assistance of AI technology by Perceptive.
