ESXI5-VM-000011 - The system must disable VM-to-VM communication through VMCI

Information

If the interface is not restricted, a VM can detect and be detected by all other VMs with the same option enabled within the same host. This might be the intended behavior, but custom-built software can have unexpected vulnerabilities that might potentially lead to an exploit. Additionally, it is possible for a VM to detect how many other VMs are within the same ESX system by simply registering the VM. This information might also be used for a potentially malicious objective. By default, the setting is FALSE. The VM can be exposed to other VMs within the same system as long as there is at least one program connected to the VMCI socket interface.

Solution

As root, log in to the ESXi host and locate the VM's vmx file.
find / | grep vmx

Add the following to the VM's vmx file.
keyword = 'keyval'

Where:
keyword = vmci0.unrestricted
keyval = FALSE

See Also

http://iasecontent.disa.mil/stigs/zip/U_ESXi5_Virtual_Machine_V1R7_STIG.zip

Item Details

Category: SYSTEM AND COMMUNICATIONS PROTECTION

References: 800-53|SC-7(21), CAT|II, CCI|CCI-000366, Group-ID|V-39452, Rule-ID|SV-51310r1_rule, STIG-ID|ESXI5-VM-000011, Vuln-ID|V-39452

Plugin: VMware

Control ID: 73d4eef2c2a6117c4335020302fe5eb8943a45aed8a301def92d6c17891a571c