Skip to content

WBEM Info

Evidence: WBEM Info
Description: ESXi WBEM Info
Category: System
Platform: esxi
Short Name: wbeminfo
Is Parsed: Yes
Sent to Investigation Hub: Yes
Collect File(s): No

Web-Based Enterprise Management (WBEM) services enable CIM (Common Information Model) based hardware monitoring and management on ESXi. WBEM configuration controls remote hardware management access and can be exploited if improperly secured or modified to enable unauthorized hardware monitoring.

This collector gathers structured data about wbem info.

FieldDescriptionExample
EnabledEnabledExample value
WSManagementServiceWS Management ServiceExample value
EnableHTTPSEnable HTTPSExample value
AuthorizationModelAuthorization ModelExample value
PortPort123
HTTPProcsHTTP Procs123
HTTPSProcsHTTPS Procs123
ProviderProcsProvider Procs123
KeepaliveTimeoutKeepalive Timeout123
KeepaliveMaxRequestsKeepalive Max Requests123
ProviderSampleIntervalProvider Sample Interval123
ProviderTimeoutIntervalProvider Timeout Interval123
HTTPMaxContentLengthHTTP Max Content Length123
MaxMessageLengthMax Message Length123
ThreadStackSizeThread Stack Size123
ProviderResourcePoolOverrideProvider Resource Pool OverrideExample value
SSLCipherListSSL Cipher ListExample value
ThreadpoolSizeThreadpool Size123
ReadonlyReadonlyExample value
LogLevelLog LevelExample value
ServiceLocationProtocolPIDService Location Protocol PID123
WSManagementPIDWS Management PID123
CIMObjectManagerPIDCIM Object Manager PID123
EnabledSSLProtocolsEnabled SSL ProtocolsExample value
EnabledSystemSSLProtocolsEnabled System SSL ProtocolsExample value
EnabledRunningSSLProtocolsEnabled Running SSL ProtocolsExample value

This collector parses WBEM service configuration, extracting service status, port settings, authentication requirements, SSL/TLS configurations, and access control settings for the WBEM management interface.

WBEM configuration analysis reveals remote management exposure, identifies weakened authentication settings, detects unauthorized service modifications, and exposes potential backdoor access through management interfaces. Unexpected WBEM access or configuration changes warrant investigation.