Just a quick post related to today’s VMware security advisories. VMware released a pair of advisories today, CVE-2016-5330 and CVE-2016-5331 and while both are nasty their scopes are somewhat limited. The 5331 issue is only applicable if you are running vCenter or ESXi 6.0 or 6.0U1, Update 2 patches the bug. The 5330 is limited to Windows VMs, running VMware Tools, and have the option HGFS component installed. To find out if you are vulnerable here’s a Power-CLI script to get all your VMs and list the installed components. Props to Jason Shiplett for giving me some assistance on the code.
$vms = Get-VM | where {$_.PowerState -eq "PoweredOn" -and $_.GuestId -match "Windows"} ForEach ($vm in $vms){ Write-Host $vm $namespace = "root\CIMV2" $componentPattern = "hcmon|vmci|vmdebug|vmhgfs|VMMEMCTL|vmmouse|vmrawdsk|vmxnet|vmx_svga" (Get-WmiObject -class Win32_SystemDriver -computername $vm -namespace $namespace | where-object { $_.Name -match $componentPattern } | Format-Table -Auto Name,State,StartMode,DisplayName ) }
While the output is still a little rough it will get you there. Alternatively if you are just using this script for the advisory listed you can change where-object { $_.Name -match $componentPattern } to where-object { $_.Name -match “vmhgfs” } . This script is also available on GitHub.