← Back to SOC feed Coverage →

ESXi Admin Permission Assigned To Account Via ESXCLI

sigma HIGH SigmaHQ
T1059.012T1098
imProcessCreate
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: medium

Hunt Hypothesis

An adversary is likely escalating privileges by assigning ESXi admin permissions to a compromised account via ESXCLI to gain persistent, elevated access within the virtualization environment. SOC teams should proactively hunt for this behavior as it indicates potential lateral movement and persistence tactics commonly used in advanced persistent threats targeting VMware infrastructure.

Detection Rule

Sigma (Original)

title: ESXi Admin Permission Assigned To Account Via ESXCLI
id: 9691f58d-92c1-4416-8bf3-2edd753ec9cf
status: test
description: Detects execution of the "esxcli" command with the "system" and "permission" flags in order to assign admin permissions to an account.
references:
    - https://developer.broadcom.com/xapis/esxcli-command-reference/7.0.0/namespace/esxcli_system.html
author: Nasreddine Bencherchali (Nextron Systems)
date: 2023-09-04
tags:
    - attack.persistence
    - attack.execution
    - attack.privilege-escalation
    - attack.t1059.012
    - attack.t1098
logsource:
    category: process_creation
    product: linux
detection:
    selection:
        Image|endswith: '/esxcli'
        CommandLine|contains: 'system'
        CommandLine|contains|all:
            - ' permission '
            - ' set'
            - 'Admin'
    condition: selection
falsepositives:
    - Legitimate administration activities
level: high

KQL (Azure Sentinel)

imProcessCreate
| where TargetProcessName endswith "/esxcli" and TargetProcessCommandLine contains "system" and (TargetProcessCommandLine contains " permission " and TargetProcessCommandLine contains " set" and TargetProcessCommandLine contains "Admin")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/linux/process_creation/proc_creation_lnx_esxcli_permission_change_admin.yml