Since exploitation of this vulnerability requires an attacker to have administrative access, it is not as high a priority, but should still be scheduled in regular software patch cycles. Keeping software on production machines up to date with security patches is paramount to maintaining a strong security posture, although patching alone is no guarantee that a breach will not occur. Detections and watchlists monitoring infrastructure with a documented baseline of normal usage may allow for detection of anomalous behavior such as vSphere Replication executing shell code to be detected. Within the past five years, the National Vulnerability Database has recorded 235 vulnerabilities involving VMware a company with a strong reputation of security and safety. In order to combat exploitation and vulnerability, a company should consider supplementing their security program with a managed security service such as Binary Defense’s Security Operations Task Force and utilize a proactive approach employed by our Threat Hunting team to greatly reduce the risk of breach cost and occurrence.