FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
dmaciejak
Staff
Staff
Article Id 250899
Description

This article describes the VMware ESXi OpenSLP vulnerability assessment with FortiDAST to mitigate ESXiArgs ransomware attacks.

 

CVE-2021-21974 vulnerability was discovered in the VMWare ESXi OpenSLP service running by default on TCP/UDP port 427.

This vulnerability is a heap overflow and can result in a remote code execution, allowing the attacker to get full control of the target.

Scope

FortiDAST version 23.1.a

Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

 

This technology enables FortiDAST to assess remotely with high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, you will need to enable the FSE group signature vmware-esxi which will select the underlying script CVE-2021-21974 VMWare ESXi OpenSLP Unauthenticated Remote Code Execution.

 

For reference, a step-by-step guide on how to configure FortiPenTest/FortiDAST to trigger FSE can be found on Fortinet’s blog.

 

For more details regarding mitigating the vulnerability by utilizing Fortinet products, refer to https://fortiguard.fortinet.com/outbreak-alert/esxiargs-ransomware
Contributors