{"uuid": "87b423df-c3c8-4cb1-a9e7-fea80c2b2ad5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "2a075640-a300-48a4-bb44-bc6130783b9b", "vulnerability": "CVE-2024-37085", "type": "published-proof-of-concept", "source": "https://t.me/Rootsec_2/3516", "content": "#hardening\n#Blue_Team_Techniques\nESXi Security-hardening:\nchange the default \"ESX Admins\" AD group\nhttps://mosnotes.com/2018/12/05/esxi-security-hardening-change-the-default-esx-admins-ad-group\n]-&gt; CVE-2024-37085: https://www.microsoft.com/en-us/security/blog/2024/07/29/ransomware-operators-exploit-esxi-hypervisor-vulnerability-for-mass-encryption/#mitigation-and-protection-guidance\n]-&gt; https://github.com/rapid7/Rapid7-Labs/blob/main/Vql/CVE-2024-37085.yaml", "creation_timestamp": "2024-08-16T11:18:08.000000Z"}