CVE-2021-22045
📋 TL;DR
This CVE describes a heap-overflow vulnerability in VMware's CD-ROM device emulation that could allow a malicious actor with access to a virtual machine to potentially execute code on the hypervisor. It affects VMware ESXi, Workstation, and Fusion products. Exploitation requires access to a VM with CD-ROM emulation enabled and typically needs to be combined with other vulnerabilities for full code execution.
💻 Affected Systems
- VMware ESXi
- VMware Workstation
- VMware Fusion
📦 What is this software?
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Esxi by Vmware
Fusion by Vmware
⚠️ Risk & Real-World Impact
Worst Case
Full hypervisor compromise allowing attacker to escape the virtual machine and gain control of the host system, potentially accessing all VMs and host resources.
Likely Case
Limited impact requiring additional vulnerabilities for full exploitation; most likely used in targeted attacks against specific VMware environments.
If Mitigated
Minimal impact if CD-ROM emulation is disabled or proper network segmentation and access controls are implemented.
🎯 Exploit Status
Exploitation requires access to a virtual machine and typically needs to be chained with other vulnerabilities for full impact. Public proof-of-concept exists.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: ESXi670-202111101-SG, ESXi650-202110101-SG, Workstation 16.2.1, Fusion 12.2.1
Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2022-0001.html
Restart Required: Yes
Instructions:
1. Download appropriate patch from VMware portal. 2. Apply patch using vSphere Update Manager or CLI. 3. Restart ESXi host or VMware application. 4. Verify patch installation.
🔧 Temporary Workarounds
Disable CD-ROM Emulation
allRemove or disable CD-ROM device from virtual machines that don't require it
vSphere Client: Edit VM Settings > Remove CD/DVD Drive
PowerCLI: Get-VM | Get-CDDrive | Remove-CDDrive
🧯 If You Can't Patch
- Disable CD-ROM device emulation on all virtual machines
- Implement strict network segmentation and limit VM-to-VM communication
🔍 How to Verify
Check if Vulnerable:
Check ESXi version with: esxcli system version get. For Workstation/Fusion: Check Help > About.
Check Version:
esxcli system version get
Verify Fix Applied:
Verify patch is installed: esxcli software vib list | grep ESXi670-202111101-SG or ESXi650-202110101-SG
📡 Detection & Monitoring
Log Indicators:
- Unusual CD-ROM access patterns
- Hypervisor crash logs
- VM escape attempt indicators
Network Indicators:
- Unusual VM-to-hypervisor communication
- Suspicious CD-ROM emulation traffic
SIEM Query:
source="vmware" AND ("CD-ROM" OR "cdrom") AND ("overflow" OR "crash" OR "exception")
🔗 References
- http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html
- https://www.vmware.com/security/advisories/VMSA-2022-0001.html
- https://www.zerodayinitiative.com/advisories/ZDI-22-003/
- http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html
- https://www.vmware.com/security/advisories/VMSA-2022-0001.html
- https://www.zerodayinitiative.com/advisories/ZDI-22-003/