Important Vulnerability in VMWare
History:
- 06/01/2022 --- v1.0 -- Initial publication
Summary
On the 4th of January 2022, VMware has released a security alert for a vulnerability affecting VMware Workstation, Fusion, ESXi Server and Cloud Foundation [1]. This vulnerability tracked as CVE-2021-22045 has an important CVSSv3 score of 7.7. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit a heap overflow vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.
Successful exploitation requires CD image to be attached to the virtual machine.
Technical Details
This is a heap-overflow vulnerability located in CD-ROM device emulation in VMware Workstation, Fusion and ESXi that was privately reported to VMware.
Affected Products
The following products are affected by the vulnerability :
Product | Affected Versions | Platform |
---|---|---|
VMware ESXi | 6.5, 6.7, 7 | Any |
VMware Workstation | 16.x | Any |
VMware Fusion | 12.x | OS X |
VMware Cloud Foundation (ESXi) | 3.x, 4.x | Any |
All previous releases of VMware ESXi 6.5 and 6.7 are vulnerable.
Recommendations
VMware has released an update and workarounds that fixes the CVE-2021-22045 [2,3,4] and a general workaround [4] showing how to disable CD-ROM/DVD devices on all running virtual machines. The workaround is meant to be a temporary solution until updates documented in [1] can be deployed.
CERT-EU strongly recommends patching as per the table below:
Product | Fixed Version | Workaround |
---|---|---|
VMware ESXi 6.5 | ESXi650-202111101-SG | 6.5 P07 Build number 18678235 [2] as per [4] |
VMware ESXi 6.7 | ESXi670-202110101-SG | 6.7 P06 Build Number 18828794 [3] as per [4] |
VMware ESXi 7 | Pending | [4] |
VMware Workstation 16.x | 16.2.0 | [5] |
VMware Fusion 12.x | 12.2.0 | [5] |
VMware Cloud Foundation (ESXi) 3.x, 4.x | Pending | [4] |
There is no requirement to implement the workaround once the recommended upgrade is complete.
References
[1] https://www.vmware.com/security/advisories/VMSA-2022-0001.html
[2] https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-202110001.html
[3] https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202111001.html