VMCH-06-000027 - The system must disable VIX messages from the VM.

Information

The VIX API is a library for writing scripts and programs to manipulate virtual machines. If you do not make use of custom VIX programming in your environment, then you should consider disabling certain features to reduce the potential for vulnerabilities. The ability to send messages from the VM to the host is one of these features. Note that disabling this feature does NOT adversely affect the functioning of VIX operations that originate outside the guest, so certain VMware and 3rd party solutions that rely upon this capability should continue to work. This is a deprecated interface.

Solution

From the vSphere Client select the Virtual Machine right click and go to Edit Settings >> VM Options Tab >> Advanced >> Configuration Parameters. Find the isolation.tools.vixMessage.disable value and set it to true. If the setting does not exist click 'Add Row' to add the setting to the virtual machine.

Note: The VM must be powered off to configure the advanced settings through the vSphere Client so it is recommended to configure these settings with PowerCLI as it can be done while the VM is powered on.

or

From a PowerCLI command prompt while connected to the ESXi host or vCenter server run the following command:

If the setting does not exist run:

Get-VM 'VM Name' | New-AdvancedSetting -Name isolation.tools.vixMessage.disable -Value true

If the setting exists run:

Get-VM 'VM Name' | Get-AdvancedSetting -Name isolation.tools.vixMessage.disable | Set-AdvancedSetting -Value true

See Also

http://iasecontent.disa.mil/stigs/zip/U_VMware_vSphere_6-0_Virtual_Machine_V1R1_STIG.zip

Item Details

Category: CONFIGURATION MANAGEMENT

References: 800-53|CM-6b., CAT|III, CCI|CCI-000366, Group-ID|V-64091, Rule-ID|SV-78581r1_rule, STIG-ID|VMCH-06-000027, Vuln-ID|V-64091

Plugin: VMware

Control ID: faf104da08bca463f46e87850838aa98dbc6472339dee37c57a6953a66d3ee43