Lucene search

K
thnThe Hacker NewsTHN:AE85D999E63D1F4908ACEFBAB15FFAAE
HistoryJan 06, 2022 - 6:17 a.m.

VMware Patches Important Bug Affecting ESXi, Workstation and Fusion Products

2022-01-0606:17:00
The Hacker News
thehackernews.com
31
vmware
patches
important
bug
esxi
workstation
fusion
products
security
vulnerability
cve-2021-22045
jaanus kรครคp
clarified security
hypervisor
cd-rom
exploitation
virtual machine
update
infiltration
networks

EPSS

0.001

Percentile

33.0%

VMware

VMWare has shipped updates to Workstation, Fusion, and ESXi products to address an โ€œimportantโ€ security vulnerability that could be weaponized by a threat actor to take control of affected systems.

The issue relates to a heap-overflow vulnerability โ€” tracked as CVE-2021-22045 (CVSS score: 7.7) โ€” that, if successfully exploited, results in the execution of arbitrary code. The company credited Jaanus Kรครคp, a security researcher with Clarified Security, for reporting the flaw.

โ€œA malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine,โ€ VMware said in an advisory published on January 4. โ€œSuccessful exploitation requires [a] CD image to be attached to the virtual machine.โ€

VMware

The error affects ESXi versions 6.5, 6.7, and 7.0; Workstation versions 16.x; and Fusion versions 12.x, with the company yet to release a patch for ESXi 7.0. In the interim, the company is recommending users to disable all CD-ROM/DVD devices on all running virtual machines to prevent any potential exploitation โ€”

  • Log in to a vCenter Server system using the vSphere Web Client.
  • Right-click the virtual machine and click Edit Settings.
  • Select the CD/DVD drive and uncheck โ€œConnectedโ€ and โ€œConnect at power onโ€ and remove any attached ISOs.

With VMwareโ€™s virtualization solutions widely deployed across enterprises, itโ€™s no surprise that its products have emerged as a popular choice for threat actors to stage a multitude of attacks against vulnerable networks. To mitigate the risk of infiltration, itโ€™s recommended that organizations move quickly to apply the necessary updates.

Found this article interesting? Follow THN on Facebook, Twitter ๏‚™ and LinkedIn to read more exclusive content we post.

EPSS

0.001

Percentile

33.0%