{"id":142985,"date":"2023-03-02T06:57:19","date_gmt":"2023-03-02T06:57:19","guid":{"rendered":"https:\/\/ded9.com\/?p=142985"},"modified":"2025-10-23T08:25:39","modified_gmt":"2025-10-23T08:25:39","slug":"esxiargs-ransomware-security-bug-and-solutions-to-fix-it","status":"publish","type":"post","link":"https:\/\/ded9.com\/de\/esxiargs-ransomware-security-bug-and-solutions-to-fix-it\/","title":{"rendered":"ESXiArgs Ransomware Vulnerability: What It Is &#038; How to Fix It"},"content":{"rendered":"<p>According to the observations and the obtained news, many servers with <a href=\"https:\/\/ded9.com\/security-bug-of-esxi-args-ransomware-and-solutions-to-fix-it\/\">ESXi<\/a> virtualizer are now at risk of ESXiArgs ransomware.<\/p>\n<p>This risk exists in all versions 5 and 6. The reason for this security bug is a service called <a href=\"https:\/\/en.wikipedia.org\/wiki\/OpenSSL\" target=\"_blank\" rel=\"noopener\">OpenSSL<\/a>. In the first step, please close the unnecessary ports as soon as possible, limit the main ports to one IP, change all your server&#8217;s access information, and back up all the VMs.<\/p>\n<p>The definitive solution to this problem is to install ESXiArgs virtualizer security patches.<\/p>\n<h2>To install the ESXI security patch, proceed as follows.<\/h2>\n<h3>1- Checking the serve@r version to download the required version:<\/h3>\n<ul>\n<li>VMware -v<\/li>\n<\/ul>\n<h3>2 &#8211; Temporary SSH activation:<\/h3>\n<ul>\n<li>host &gt; configuration &gt; security profile &gt; services &gt; properties &gt; SSH<\/li>\n<li>Or, in the new version, enable TSM-SSH in ADS (instead of IP, enter the IP of the server):<\/li>\n<li>https:\/\/YOUR-IP\/ui\/#\/host\/manage\/services<\/li>\n<\/ul>\n<h3>3- Log in to SSH and enter the following commands:<\/h3>\n<ul>\n<li>Cd\/vmfs\/volumes\/datastore1\/<\/li>\n<\/ul>\n<h3>4- According to the installed version, download one of the links:<\/h3>\n<ul>\n<li dir=\"ltr\">wget https:\/\/dl.ded9.com\/ISO\/ESXi\/Patch\/ESXi670-202210001.zip<\/li>\n<li dir=\"ltr\">wget https:\/\/dl.ded9.com\/ISO\/ESXi\/Patch\/ESXi650-202210001.zip<\/li>\n<li dir=\"ltr\">wget https:\/\/dl.ded9.com\/ISO\/ESXi\/Patch\/ESXi600-202002001.zip<\/li>\n<\/ul>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\"aligncenter wp-image-239213 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/1-2.jpg\" alt=\"According to the installed version, download one of the links:\" width=\"1604\" height=\"384\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/1-2.jpg 1604w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/1-2-300x72.jpg 300w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/1-2-1024x245.jpg 1024w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/1-2-768x184.jpg 768w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/1-2-1536x368.jpg 1536w\" sizes=\"(max-width: 1604px) 100vw, 1604px\" \/><\/p>\n<h3>5- Then install the same downloaded version with the following command:<\/h3>\n<ul>\n<li dir=\"ltr\">esxcli software vib update -d \/vmfs\/volumes\/datastore1\/ESXi670-202210001.zip<\/li>\n<li dir=\"ltr\">esxcli software vib update -d \/vmfs\/volumes\/datastore1\/ESXi650-202210001.zip<\/li>\n<li dir=\"ltr\">esxcli software vib update -d\/vmfs\/volumes\/datastore1\/ESXi600-202002001.zip<\/li>\n<\/ul>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-239216 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/2-2.jpg\" alt=\"Then install the same downloaded version with the following command\" width=\"1242\" height=\"626\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/2-2.jpg 1242w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/2-2-300x151.jpg 300w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/2-2-1024x516.jpg 1024w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/2-2-768x387.jpg 768w\" sizes=\"(max-width: 1242px) 100vw, 1242px\" \/><\/p>\n<p>6- If a successful message is seen in the update, we will reboot the server.<\/p>\n<p><img decoding=\"async\" class=\"aligncenter wp-image-239219 size-full\" src=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/3-3.jpg\" alt=\"If a successful message is seen in the update, we will reboot the server.\" width=\"1619\" height=\"821\" srcset=\"https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/3-3.jpg 1619w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/3-3-300x152.jpg 300w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/3-3-1024x519.jpg 1024w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/3-3-768x389.jpg 768w, https:\/\/ded9.com\/wp-content\/uploads\/2023\/03\/3-3-1536x779.jpg 1536w\" sizes=\"(max-width: 1619px) 100vw, 1619px\" \/><\/p>\n<p>7- After the server is up, you may not have access to SSH. To check the installed version through the web panel, you can check the installed version or activate SSH again according to step 2, and enter the command to check the version entered in step 1. We have to type again to know the correctness of the update.<\/p>\n<h2>FAQ<\/h2>\n<div id=\"rank-math-rich-snippet-wrapper\"><div id=\"rank-math-faq\" class=\"rank-math-block\">\n<div class=\"rank-math-list \">\n<div id=\"faq-1\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">Which ESXi versions are vulnerable to ESXiArgs?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>All major ESXi 5.x and 6.x versions are at risk due to the targeted OpenSSL component.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-2\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">What\u2019s the first step you should take if your ESXi server is at risk?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Immediately close unnecessary ports, restrict access to critical ports by IP, change all server credentials, and back up all virtual machines.<\/p>\n\n<\/div>\n<\/div>\n<div id=\"faq-3\" class=\"rank-math-list-item\">\n<h3 class=\"rank-math-question \">How do you apply the security patch to fix ESXiArgs?<\/h3>\n<div class=\"rank-math-answer \">\n\n<p>Check your ESXi version with vmware -v. Enable SSH temporarily and log in. Download the correct patch ZIP file for your version. Use esxcli software vib update -d .zip to install it. Reboot the server and recheck the version to confirm the update.<\/p>\n\n<\/div>\n<\/div>\n<\/div>\n<\/div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>According to the observations and the obtained news, many servers with ESXi virtualizer are now at risk of ESXiArgs ransomware. This risk exists in all versions 5 and 6. The reason for this security bug is a service called OpenSSL. In the first step, please close the unnecessary ports as soon as possible, limit the [&hellip;]<\/p>\n","protected":false},"author":9,"featured_media":239222,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[86],"tags":[1245],"class_list":["post-142985","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-server","tag-ssh"],"acf":[],"amp_enabled":true,"_links":{"self":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/142985","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/users\/9"}],"replies":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/comments?post=142985"}],"version-history":[{"count":4,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/142985\/revisions"}],"predecessor-version":[{"id":253609,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/posts\/142985\/revisions\/253609"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/media\/239222"}],"wp:attachment":[{"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/media?parent=142985"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/categories?post=142985"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ded9.com\/de\/wp-json\/wp\/v2\/tags?post=142985"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}