Check: ESX0570
VMware ESX 3 Server:
ESX0570
(in version v1 r2)
Title
VI Web Access sessions to the ESX Server are unencrypted. (Cat II impact)
Discussion
User sessions with the ESX Server should be encrypted since transmitting data in plaintext may be viewed as it travels through the network. User sessions may be initiated from the VI client, Web Access, or through VirtualCenter. To encrypt session data, the sending component, such as a gateway or redirector, applies ciphers to alter the data before transmitting it. The receiving component uses a key to decrypt the data, returning it to its original form. To ensure the protection of the data transmitted to and from external network connections, ESX Server uses the 256-bit AES block encryption. ESX Server also uses 1024-bit RSA for key exchange. These encryption algorithms are the default for VI Client, VI Web Access, and VirtualCenter sessions.
Check Content
1. First verify Web Access is enabled by having the IAO/SA attempt to login to the ESX Server. 2. Start the Web Browser 3. Enter the URL of the ESX Server: http://(host or server name)/ui. The http should transition to https://(host or server name)/ui. If it does not transition to https, this is a finding.
Fix Text
Encrypt all Web Access session to ESX Servers.
Additional Identifiers
Rule ID: SV-16797r1_rule
Vulnerability ID: V-15856
Group Title: VI Web Access sessions are not encrypted.
Expert Comments
CCIs
Number | Definition |
---|---|
No CCIs are assigned to this check |
Controls
Number | Title |
---|---|
No controls are assigned to this check |