#VMware #ESXi zero-days likely exploited a year before disclosure

Chinese-speaking threat actors used a compromised SonicWall VPN appliance to deliver a VMware ESXi exploit toolkit that seems to have been developed more than a year before the targeted vulnerabilities became publicly known.
Researchers reveal the MAESTRO toolkit used to exploit VMware VM escape vulnerabilities, showing how attackers broke out of virtual machines and targeted ESXi servers.
Read: https://hackread.com/maestro-toolkit-vmware-vm-escape-vulnerabilities/
Hackers chineses exploraram falhas no VMware ESXi um ano antes da descoberta
🔗 https://tugatech.com.pt/t76590-hackers-chineses-exploraram-falhas-no-vmware-esxi-um-ano-antes-da-descoberta
🎉 Nous sommes ravis d’annoncer notre partenariat en tant que revendeur agréé @proxmox
L’objectif est de mettre à profit notre expérience pour optimiser votre utilisation des solutions #Proxmox.
Ce que nous vous proposons :
🕵️ Audit
🚀 Déploiement
➡️ Migration
🛠️ Assistance technique
🎓 Formations
Quel que soit votre projet, nous sommes prêts à relever le défi à vos côtés.
Si vous envisagez une migration depuis #VMware découvrez l’avis de notre CTO, Thibaut Démaret : https://www.worteks.com/blog/2025-12-29-proxmox-et-vmware/
"We at VMware want you to know that there is a new free version of Fusion available. But to download it we're going to make you play a game of 'Outguess the Dark Pattern' to actually figure out how to do the download. It's not that our web devs are assholes, they're just incompetent."
New.
"The attackers got in through a compromised SonicWall VPN."
Huntress: The Great VM Escape: ESXi Exploitation in the Wild https://www.huntress.com/blog/esxi-vm-escape-exploit @huntress #infosec #threatresearch #VMWare #SonicWall