Your Yello Ring Road To Success
GOOGLE LOGIN MY ADS MY SHOP

VMware Patches Important Bug Affecting ESXi, Workstation and Fusion Products

VMware

VMWare has shipped updates to Workstation, Fusion, and ESXi
products to address an “important” security vulnerability that
could be weaponized by a threat actor to take control of affected
systems.

The issue relates to a heap-overflow vulnerability — tracked as
CVE-2021-22045 (CVSS score: 7.7) — that, if
successfully exploited, results in the execution of arbitrary code.
The company credited Jaanus Kääp, a security researcher with
Clarified Security, for reporting the flaw.

Automatic GitHub Backups

“A malicious actor with access to a virtual machine with CD-ROM
device emulation may be able to exploit this vulnerability in
conjunction with other issues to execute code on the hypervisor
from a virtual machine,” VMware said[1]
in an advisory published on January 4.

VMware

The error affects ESXi versions 6.5, 6.7, and 7.0; Workstation
versions 16.x; and Fusion versions 12.x, with the company yet to
release a patch for ESXi 7.0. In the interim, the company is
recommending[2]
users to disable all CD-ROM/DVD devices on all running virtual
machines to prevent any potential exploitation —

  • Log in to a vCenter Server system using the vSphere Web
    Client.
  • Right-click the virtual machine and click Edit Settings.
  • Select the CD/DVD drive and uncheck “Connected” and “Connect at
    power on” and remove any attached ISOs.

With VMware’s virtualization solutions widely deployed across
enterprises, it’s no surprise that its products[3]
have emerged[4]
as a popular[5]
choice[6]
for threat actors[7]
to stage a multitude of attacks against vulnerable networks. To
mitigate the risk of infiltration, it’s recommended that
organizations move quickly to apply the necessary updates.

References

  1. ^
    said
    (www.vmware.com)
  2. ^
    recommending
    (kb.vmware.com)
  3. ^
    products
    (thehackernews.com)
  4. ^
    emerged
    (thehackernews.com)
  5. ^
    popular
    (thehackernews.com)
  6. ^
    choice
    (thehackernews.com)
  7. ^
    threat
    actors
    (thehackernews.com)

Read more