VMware vSphere

  • 1.  Regarding impact of VMSA-2024-0006

    Posted Mar 12, 2024 06:46 AM

    Hi,
    We have few virtual machines deployed on ESXi 7.x and ESXi 8.x. We have a query with regard to impact of VMSA-2024-0006.1 (vmware.com)

    The USB controller on all these VMs are disabled by default. Hence, we would like to know if we are still affected by these vulnerabilities (CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255) when there is no USB controller device and should we still recommend patching of ESXi Servers to end users ?
    Please let us know.

    Thank you.



  • 2.  RE: Regarding impact of VMSA-2024-0006

    Posted Mar 12, 2024 10:27 AM

    Hello,


    It all depends on where you start from, i.e. which other defects / vulnerabilities have been corrected in the meantime. Generally speaking, applying the most recent updates it is generally recommended, but you have to evaluate times and methods based on your specific IT context. I mean, my small computing context allows me to adopt a (sometimes rather extreme) approach that is inapplicable (or at least inadvisable) in several other computing contexts.


    Regards,
    Ferdinando



  • 3.  RE: Regarding impact of VMSA-2024-0006

    Posted Mar 13, 2024 12:51 PM

    Thanks for your inputs Ferdinando. Very much appreciated.

    We are recommending patching of ESXi Servers for end users.



  • 4.  RE: Regarding impact of VMSA-2024-0006

    Posted Mar 14, 2024 07:18 PM

     - For VMs that do not have a USB Controller, they are not vulnerable, but, as  rightly pointed out, it is best practise to keep your hosts patched, and you should get into a routine of updating them as new builds become available. After you've done it a few times, it is usually fairly trivial to do.

     

    If you subscribe to the following vCenter and ESXi release pages, you will be emailed when updates are released

    You can also subscribe to VMware security announcements here (if you havn't already)

     

    HTH