ESXI5-VM-000014 - Unexposed feature isolation.tools.ghi.autologon.disable must be initialized to decrease the VMs attack vectors

Information

Because VMware virtual machines are designed to work on both vSphere, as well as hosted virtualization platforms such as Workstation and Fusion, there are some VMX parameters that do not apply when running on vSphere. Although the functionality governed by these parameters is not exposed on ESX, explicitly disabling them will reduce the potential for vulnerabilities. Disabling these features reduces the number of vectors through which a guest can attempt to influence the host, and thus may help prevent successful exploits.

Solution

As root, log in to the ESXi host and locate the VM's vmx file.
find / | grep vmx

Add the following to the VM's vmx file.
keyword = 'keyval'

Where:
keyword = isolation.tools.ghi.autologon.disable
keyval = TRUE

See Also

http://iasecontent.disa.mil/stigs/zip/U_ESXi5_Virtual_Machine_V1R7_STIG.zip

Item Details

Category: ACCESS CONTROL

References: 800-53|AC-14, CAT|III, CCI|CCI-000366, Group-ID|V-39456, Rule-ID|SV-51314r1_rule, STIG-ID|ESXI5-VM-000014, Vuln-ID|V-39456

Plugin: VMware

Control ID: 4d8e3970d7ebd5f467ad8cb5b3f10afc3f93fb513eea992b02daf00255f91898