0% found this document useful (0 votes)
23 views6 pages

TS 23R3NM SW 2144

TS-23R3NM-SW-2144

Uploaded by

mp.phong.hte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
0% found this document useful (0 votes)
23 views6 pages

TS 23R3NM SW 2144

TS-23R3NM-SW-2144

Uploaded by

mp.phong.hte
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd

No further reproduction or networking is permitted. Distributed by Nokia.

Copyrighted material licensed to [email protected] on 12-03-2025.


Technic al Support Note

VMware ESXi vulnerabilities VMSA-2025-


0004

Id:
TS-23R3NM -SW -2144
TS-23R4NM -SW -2144
TS-24R1NM -SW -2144
TS-24R2NM -SW -2144
TS-24R3NM -SW -2144
TS-25R1NM -SW -2144

Product Family: Operations Support Systems


Product: MantaRay NM
Release: 23R3-NM, 23R4-NM, 24R1-NM, 24R2-NM, 24R3-NM,
25R1-NM

This document contains following


type of information
Informative x
Preventive x
Corrective
Additional categorization
Urgent x
Security x
Release Upgrade
SW Update
Information is classified as
Internal
All Customers x
Customer Specific

Technical Support Note - Page 1/6 © Nokia 2025


Confidential
No further reproduction or networking is permitted. Distributed by Nokia.
Copyrighted material licensed to [email protected] on 12-03-2025.
Disclaimer
The information in this document applies solely to the hardware/software product (“Product”) specified herein, and only as specified
herein. Reference to “Nokia” later in this document shall mean the respective company within Nokia Group of Companies with whom
you have entered into the Agreement (as defined below).

This document is intended for use by Nokia's customers (“You”) only, and it may not be used except for the purposes defined in the
agreement between You and Nokia (“Agreement”) under which this document is distributed. No part of this document may be used,
copied, reproduced, modified or transmitted in any form or means without the prior written permission of Nokia. If You have not
entered into an Agreement applicable to the Product, or if that Agreement has expired or has been terminated, You may not use this
document in any manner and You are obliged to return it to Nokia and destroy or delete any copies thereof.

The document has been prepared to be used by professional and properly trained personnel, and You assume full responsibility
when using it. Nokia welcomes your comments as part of the process of continuous development and improvement of the
documentation.

This document and its contents are provided as a convenience to You. Any information or statements concerning the suitability,
capacity, fitness for purpose or performance of the Product are given solely on an “as is” and “as available” basis in this document,
and Nokia reserves the right to change any such information and statements without notice. Nokia has made all reasonable efforts to
ensure that the content of this document is adequate and free of material errors and omissions, and Nokia will correct errors that You
identify in this document. Nokia's total liability for any errors in the document is strictly limited to the correction of such error(s). Nokia
does not warrant that the use of the software in the Product will be uninterrupted or error-free.

NO WARRANTY OF ANY KIND, EITHER EXPRESS OR IMPLIED, INCLUDING BUT NOT LIMITED TO ANY WARRANTY OF
AVAILABILITY, ACCURACY, RELIABILITY, TITLE, NON-INFRINGEMENT, MERCHANTABILITY OR FITNESS FOR A
PARTICULAR PURPOSE, IS MADE IN RELATION TO THE CONTENT OF THIS DOCUMENT. IN NO EVENT WILL NOKIA BE
LIABLE FOR ANY DAMAGES, INCLUDING BUT NOT LIMITED TO SPECIAL, DIRECT, INDIRECT, INCIDENTAL OR
CONSEQUENTIAL OR ANY LOSSES, SUCH AS BUT NOT LIMITED TO LOSS OF PROFIT, REVENUE, BUSINESS
INTERRUPTION, BUSINESS OPPORTUNITY OR DATA THAT MAY ARISE FROM THE USE OF THIS DOCUMENT OR THE
INFORMATION IN IT, EVEN IN THE CASE OF ERRORS IN OR OMISSIONS FROM THIS DOCUMENT OR ITS CONTENT.

This document is Nokia proprietary and confidential information, which may not be distributed or disclosed to any third parties without
the prior written consent of Nokia.

Nokia is a registered trademark of Nokia Corporation. Other product names mentioned in this document may be trademarks of their
respective owners.

Copyright © 2025 Nokia. All rights reserved.

Important Notice on Product Safety


This product may present safety risks due to laser, electricity, heat, and other sources of danger.

Only trained and qualified personnel may install, operate, maintain or otherwise handle this product and only after having
carefully read the safety information applicable to this product.

The safety information is provided in the Safety Information section in the “Legal, Safety and Environmental Information”
part of this document or documentation set.

Nokia is continually striving to reduce the adverse environmental effects of its products and services. We would like to encourage you
as our customers and users to join us in working towards a cleaner, safer environment. Please recycle product packaging and follow
the recommendations for power use and proper disposal of our products and their components.

If you should have questions regarding our Environmental Policy or any of the environmental services we offer, please contact us at
Nokia for any additional information.

Technical Support Note - Page 2/6 © Nokia 2025


Confidential
No further reproduction or networking is permitted. Distributed by Nokia.
Copyrighted material licensed to [email protected] on 12-03-2025.
Table of Contents
Purpose........................................................................................................................................ 4
1. Keywords ............................................................................................................................. 4
2. Summary .............................................................................................................................. 4
3. Configuration information...................................................................................................... 5
4. Instructions ........................................................................................................................... 5
4.1 .... Mitigation and control measures ..................................................................................... 5
4.2 .... Remediation plan............................................................................................................ 6

Contact: Contact your local Nokia Networks support.

Summary of changes:

Date Version Summary of changes


07.03.2025 1.0 First version.
07.03.2025 1.1 Updated title and summary.
07.03.2025 1.2 Review comments updated.

Technical Support Note - Page 3/6 © Nokia 2025


Confidential
No further reproduction or networking is permitted. Distributed by Nokia.
Copyrighted material licensed to [email protected] on 12-03-2025.
PURPOSE

This Technical Support Note (TSN) document contains information for the MantaRay NM
product. This TS Note contains information related to the product usage or functionality
(Informative TS Note), instructions how to prevent problem situations (Preventive TS Note)
or workaround instructions how to recover from problem situations (Corrective TS Note).

1. KEYWORDS

VMware, ESXi, vulnerability

2. SUMMARY

Multiple vulnerabilities reported in VMware ESXi. VMware (Broadcom) released patches to


address these vulnerabilities.
https://support.broadcom.com/web/ecx/support-content-notification/-
/external/content/SecurityAdvisories/0/25390
a) VMCI heap-overflow vulnerability (CVE-2025-22224): VMware ESXi, and
Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that
leads to an out-of-bounds write. A malicious actor with local administrative
privileges on a virtual machine may exploit this issue to execute code as the
virtual machine's VMX process running on the host.
b) VMware ESXi arbitrary write vulnerability (CVE-2025-22225): VMware ESXi
contains an arbitrary write vulnerability. A malicious actor with privileges within
the VMX process may trigger an arbitrary kernel write leading to an escape of
the sandbox.
c) HGFS information-disclosure vulnerability (CVE-2025-22226): VMware ESXi,
Workstation, and Fusion contain an information disclosure vulnerability due to
an out-of-bounds read in HGFS. A malicious actor with administrative privileges
to a virtual machine may be able to exploit this issue to leak memory from the
vmx process.
MantaRay NM customers having ESXi 7.0 or ESXi 8.0 are impacted. Nokia expert severity
is High based on the CVSS vectors as exploiting this vulnerability requires administrator/root
privileges on the guest operating system.
CVE-2025-22224: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H/MPR:H
CVE-2025-22225: CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H
CVE-2025-22226: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N
It is always recommended to restrict administrator/root credentials to bare minimum
personnel. For baremetal solution, MantaRay NM is hosted in a private network with
dedicated ESXi hosts which further reduces the impact of this exploitation.
Note that VMware Cloud environments are also impacted. Please contact your Cloud
provider for corrections.

Technical Support Note - Page 4/6 © Nokia 2025


Confidential
No further reproduction or networking is permitted. Distributed by Nokia.
Copyrighted material licensed to [email protected] on 12-03-2025.
3. CONFIGURATION INFORMATION

This TSN requires Release / MP / SP / PP installed: VMware ESXi 7.0, VMware ESXi 8.0
For which Cloud variants is this TSN valid?
Cloud variant Yes No
VMware x
OpenStack x

Changes to be merged in Release / MP / SU:


SU1482, Security update for VMware ESXi 8.0 vulnerabilities VMSA-2025-0004
SU1483, Security update for VMware ESXi 7.0 vulnerabilities VMSA-2025-0004
Related problem IDs: PR818687, PR818688
Configured servers: ESXi hosts
Is anything restarted during implementation? No. This is informative TSN.
Other information: None.

4. INSTRUCTIONS

4.1 Mitigation and control measures

Users can apply the following mitigation and control measures available in operating
documentation to reduce the exploitation scope:

1. Remote root login to VMs running Linux guest OS is disabled by default.


a. If the Linux guest OS have been unhardened, its recommended to follow
‘Security Management > Security Management Operating Procedures >
Administering MantaRay NM System Security > Hardening for MantaRay NM
applications and services > Root control measures in MantaRay NM >
Controlling Root SSH login’ steps to disable remote root access.
b. On Windows server, administrator can be disabled, and alternate administrator
can be created with personalised user ref steps:
i. ‘Security Management > Security Management Operating Procedures >
Administering MantaRay NM System Security > Hardening of Node
Manager Server > Remote super user login restriction’. From 24R3-NM,
remote access as administrator account on Windows can also be disabled
as an option following above steps.
ii. Security Management > Security Management Operating Procedures >
Administering MantaRay NM System Security > Hardening of Node
Manager Server > Managing hardening settings > Enabling hardening
settings

2. Assess the ssh access for end users and system users. Reduce access as applicable.
Ssh to the guest operating system can be controlled to reduce potential number of
users with knowledge of root credentials from attempting to elevate to root.
a. Administering SSH access for end users in ‘Security Management > Security
Management Operating Procedures > Administering Users and Permissions >

Technical Support Note - Page 5/6 © Nokia 2025


Confidential
No further reproduction or networking is permitted. Distributed by Nokia.
Copyrighted material licensed to [email protected] on 12-03-2025.
Administering MantaRay NM end users and password > Managing user SSH
and certificate configuration > Disable SSH login’
b. Administering remote ssh access as system users in ‘Security Management >
Security Management Operating Procedures > Administering Users and
Permissions > Administering MantaRay NM system users and password >
SSH access restrictions’.

3. Rotate the root and administrator password and vault them to a need-to-know basis.
Follow steps in Operating Documentation ‘Security Management > Security
Management Operating Procedures > Administering Users and Permissions >
Administering MantaRay NM system users and password > Changing password of
directory server, database, OS, and active directory users’

4.2 Remediation plan

Corrections will be provided for all MantaRay NM releases in the following software
deliveries:
SU1482, Security update for VMware ESXi 8.0 vulnerabilities VMSA-2025-0004
SU1483, Security update for VMware ESXi 7.0 vulnerabilities VMSA-2025-0004
Estimated delivery date for SU1482 and SU1483 is 21st March 2025.

Technical Support Note - Page 6/6 © Nokia 2025


Confidential

You might also like