CVE-2019-5544

9.8 CRITICAL

📋 TL;DR

CVE-2019-5544 is a critical heap overflow vulnerability in OpenSLP used by VMware ESXi and Horizon DaaS appliances. It allows remote attackers to execute arbitrary code or cause denial of service by sending specially crafted packets. Organizations running affected VMware products are at risk.

💻 Affected Systems

Products:
  • VMware ESXi
  • VMware Horizon DaaS appliances
Versions: ESXi 6.7 prior to ESXi670-201912001, ESXi 6.5 prior to ESXi650-202002001, ESXi 6.0 prior to ESXi600-202005001
Operating Systems: VMware ESXi hypervisor
Default Config Vulnerable: ⚠️ Yes
Notes: OpenSLP service runs by default on affected VMware products. Horizon DaaS appliances use vulnerable OpenSLP versions.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Remote code execution with root privileges leading to complete system compromise, data theft, and lateral movement within the network.

🟠

Likely Case

Remote code execution resulting in system compromise and potential ransomware deployment or data exfiltration.

🟢

If Mitigated

Denial of service if exploit fails, but system remains vulnerable to subsequent attacks.

🌐 Internet-Facing: HIGH - Exploitable remotely without authentication, making internet-facing systems immediate targets.
🏢 Internal Only: HIGH - Even internal systems are vulnerable to network-based attacks from compromised internal hosts.

🎯 Exploit Status

Public PoC: ⚠️ Yes
Weaponized: LIKELY
Unauthenticated Exploit: ⚠️ Yes
Complexity: LOW

Proof-of-concept exploit code is publicly available. The vulnerability requires no authentication and has low attack complexity.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: ESXi670-201912001, ESXi650-202002001, ESXi600-202005001

Vendor Advisory: http://www.vmware.com/security/advisories/VMSA-2019-0022.html

Restart Required: Yes

Instructions:

1. Download appropriate patch from VMware portal. 2. Place ESXi host in maintenance mode. 3. Apply patch using esxcli software vib update command. 4. Reboot host. 5. Verify patch installation.

🔧 Temporary Workarounds

Disable OpenSLP service

linux

Temporarily disable the vulnerable OpenSLP service to prevent exploitation

esxcli system slp stats set --enable=false

🧯 If You Can't Patch

  • Isolate affected systems from untrusted networks using firewall rules
  • Implement strict network segmentation to limit potential lateral movement

🔍 How to Verify

Check if Vulnerable:

Check ESXi version with 'esxcli system version get' and compare against patched versions

Check Version:

esxcli system version get

Verify Fix Applied:

Verify patch installation with 'esxcli software vib list | grep open-vm-tools' and check version

📡 Detection & Monitoring

Log Indicators:

  • Unusual SLP service activity in /var/log/syslog.log
  • Failed authentication attempts following SLP traffic

Network Indicators:

  • Unusual traffic to port 427 (SLP)
  • Malformed SLP packets in network captures

SIEM Query:

source="ESXi" AND (port=427 OR protocol="SLP") AND (size>normal OR malformed_packet)

🔗 References

📤 Share & Export