{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2022-001.pdf"
    },
    "title": "Important Vulnerability in VMWare",
    "serial_number": "2022-001",
    "publish_date": "06-01-2022 12:03:00",
    "description": "On the 4th of January 2022, VMware has released a security alert for a vulnerability affecting VMware Workstation, Fusion, ESXi Server and Cloud Foundation. This vulnerability tracked as CVE-2021-22045 has an important CVSSv3 score of 7.7. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit a heap overflow vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.<br>Successful exploitation requires CD image to be attached to the virtual machine.",
    "url_title": "2022-001",
    "content_markdown": "---\ntitle: 'Important Vulnerability in\u00a0VMWare'\nversion: '1.0'\nnumber: '2022-001'\ndate: 'January 6, 2022'\n---\n\n_History:_\n\n* _06/01/2022 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn the 4th of January 2022, VMware has released a security alert for a vulnerability affecting VMware Workstation, Fusion, ESXi Server and Cloud Foundation [1]. This vulnerability tracked as CVE-2021-22045 has an important CVSSv3 score of 7.7. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit a heap overflow vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.\n\nSuccessful exploitation requires CD image to be attached to the virtual machine.\n\n# Technical Details\n\nThis is a heap-overflow vulnerability located in CD-ROM device emulation in VMware Workstation, Fusion and ESXi that was privately reported to VMware.\n\n# Affected Products\n\nThe following products are affected by the vulnerability :\n\n| Product           | Affected Versions                    | Platform |\n|:-----------------:|:-----------------------------------------:|:--------:|\n|VMware ESXi | 6.5, 6.7, 7 | Any |\n|VMware Workstation | 16.x | Any |\n|VMware Fusion | 12.x  | OS X |\n|VMware Cloud Foundation (ESXi) |3.x, 4.x|Any|\n\nAll previous releases of VMware ESXi 6.5 and 6.7 are vulnerable.\n\n# Recommendations\n\nVMware has released an update and workarounds that fixes the CVE-2021-22045 [2,3,4] and a general workaround [4] showing how to disable CD-ROM/DVD devices on all running virtual machines. The workaround is meant to be a temporary solution until updates documented in [1] can be deployed.\n\nCERT-EU strongly recommends patching as per the table below:\n\n| Product         | Fixed Version   | Workaround |\n|:---------------:|:---------------:|:--------------:|\n|VMware ESXi 6.5 |ESXi650-202111101-SG| 6.5 P07 Build number 18678235 [2] as per [4]|\n|VMware ESXi 6.7 |ESXi670-202110101-SG| 6.7 P06 Build Number 18828794 [3] as per [4]|\n|VMware ESXi 7 |Pending|[4]|\n|VMware Workstation 16.x| 16.2.0       |[5] |\n|VMware Fusion 12.x | 12.2.0       |[5] |\n|VMware Cloud Foundation (ESXi) 3.x, 4.x| Pending| [4]\n\nThere is no requirement to implement the workaround once the recommended upgrade is complete.\n\n# References\n\n[1] <https://www.vmware.com/security/advisories/VMSA-2022-0001.html>\n\n[2] <https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-202110001.html>\n\n[3] <https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202111001.html>\n\n[4] <https://kb.vmware.com/s/article/87249>\n\n[5] <https://kb.vmware.com/s/article/87206>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>06/01/2022 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On the 4th of January 2022, VMware has released a security alert for a vulnerability affecting VMware Workstation, Fusion, ESXi Server and Cloud Foundation [1]. This vulnerability tracked as CVE-2021-22045 has an important CVSSv3 score of 7.7. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit a heap overflow vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.</p><p>Successful exploitation requires CD image to be attached to the virtual machine.</p><h2 id=\"technical-details\">Technical Details</h2><p>This is a heap-overflow vulnerability located in CD-ROM device emulation in VMware Workstation, Fusion and ESXi that was privately reported to VMware.</p><h2 id=\"affected-products\">Affected Products</h2><p>The following products are affected by the vulnerability :</p><table><thead><tr><th style=\"text-align:center;\">Product</th><th style=\"text-align:center;\">Affected Versions</th><th style=\"text-align:center;\">Platform</th></tr></thead><tbody><tr><td style=\"text-align:center;\">VMware ESXi</td><td style=\"text-align:center;\">6.5, 6.7, 7</td><td style=\"text-align:center;\">Any</td></tr><tr><td style=\"text-align:center;\">VMware Workstation</td><td style=\"text-align:center;\">16.x</td><td style=\"text-align:center;\">Any</td></tr><tr><td style=\"text-align:center;\">VMware Fusion</td><td style=\"text-align:center;\">12.x</td><td style=\"text-align:center;\">OS X</td></tr><tr><td style=\"text-align:center;\">VMware Cloud Foundation (ESXi)</td><td style=\"text-align:center;\">3.x, 4.x</td><td style=\"text-align:center;\">Any</td></tr></tbody></table><p>All previous releases of VMware ESXi 6.5 and 6.7 are vulnerable.</p><h2 id=\"recommendations\">Recommendations</h2><p>VMware has released an update and workarounds that fixes the CVE-2021-22045 [2,3,4] and a general workaround [4] showing how to disable CD-ROM/DVD devices on all running virtual machines. The workaround is meant to be a temporary solution until updates documented in [1] can be deployed.</p><p>CERT-EU strongly recommends patching as per the table below:</p><table><thead><tr><th style=\"text-align:center;\">Product</th><th style=\"text-align:center;\">Fixed Version</th><th style=\"text-align:center;\">Workaround</th></tr></thead><tbody><tr><td style=\"text-align:center;\">VMware ESXi 6.5</td><td style=\"text-align:center;\">ESXi650-202111101-SG</td><td style=\"text-align:center;\">6.5 P07 Build number 18678235 [2] as per [4]</td></tr><tr><td style=\"text-align:center;\">VMware ESXi 6.7</td><td style=\"text-align:center;\">ESXi670-202110101-SG</td><td style=\"text-align:center;\">6.7 P06 Build Number 18828794 [3] as per [4]</td></tr><tr><td style=\"text-align:center;\">VMware ESXi 7</td><td style=\"text-align:center;\">Pending</td><td style=\"text-align:center;\">[4]</td></tr><tr><td style=\"text-align:center;\">VMware Workstation 16.x</td><td style=\"text-align:center;\">16.2.0</td><td style=\"text-align:center;\">[5]</td></tr><tr><td style=\"text-align:center;\">VMware Fusion 12.x</td><td style=\"text-align:center;\">12.2.0</td><td style=\"text-align:center;\">[5]</td></tr><tr><td style=\"text-align:center;\">VMware Cloud Foundation (ESXi) 3.x, 4.x</td><td style=\"text-align:center;\">Pending</td><td style=\"text-align:center;\">[4]</td></tr></tbody></table><p>There is no requirement to implement the workaround once the recommended upgrade is complete.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.vmware.com/security/advisories/VMSA-2022-0001.html\">https://www.vmware.com/security/advisories/VMSA-2022-0001.html</a></p><p>[2] <a rel=\"noopener\" target=\"_blank\" href=\"https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-202110001.html\">https://docs.vmware.com/en/VMware-vSphere/6.5/rn/esxi650-202110001.html</a></p><p>[3] <a rel=\"noopener\" target=\"_blank\" href=\"https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202111001.html\">https://docs.vmware.com/en/VMware-vSphere/6.7/rn/esxi670-202111001.html</a></p><p>[4] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.vmware.com/s/article/87249\">https://kb.vmware.com/s/article/87249</a></p><p>[5] <a rel=\"noopener\" target=\"_blank\" href=\"https://kb.vmware.com/s/article/87206\">https://kb.vmware.com/s/article/87206</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}