Virtual Machine Security

Posted on 2010-11-10
Medium Priority
Last Modified: 2012-06-22
I'm running a VM which connects to a wireless network completely separate from my office LAN. (i.e., I've disabled the wired NIC on the VM and the connection is not bridged... I use a USB WiFi adapter which provides the VM with an internet connection. The question of security came up today - if my VM were to become infected, could it also infect my host? (From what I've read this is a rather debatable question, so I'm excited about what discussions may arise.)
Question by:MassanuttenComputer

Expert Comment

ID: 34104867
As long as they share no drives or network interfaces, it shouldn't be possible for the host system to be infected. If you make backups you are able to access on the host system and actually do so, you obviously risk infecting the host system too, but that's not really within the scope of this question.

I assume you configured the VM itself not to have a network interface instead of just disabling it from the VM operating system. If not, and if we assume the possibilities are endless, you might be infected with a virus that'd re-enable the network interface, sniffed the traffic enough to configure it properly and proceed to infecting your system.

..and if that was an issue to you, you would've made sure there's no way for that to happen - or would probably have set the system up in a completely isolated machine in the first place.

One possible issue is of course another machine at your location connecting to the said WLAN by accident(?), being infected and then spreading the virus when reconnected to the proper network. Not very probable assuming you bothered to protect the WLAN and made sure nobody else has access to it at your location.  
LVL 27

Accepted Solution

Tolomir earned 2000 total points
ID: 34106160
Virtualization tools provide a sandbox and there are ways to break out of the sandbox.
At least use latest version of these tools and also use security tools on your virtual machine.

See also:

An Empirical Study into the Security Exposure to Hosts of Hostile Virtualized Environments


No virtual machine tested was robust enough to withstand
the  testing  procedure  used,  and  multiple  exploitable  flaws
were presented that could allow an attacker restricted to a vir-
tualised environment to reliably escape onto the host system.
The  results  obtained  demonstrate  the  need  for  further
research into virtualisation security and prove that virtualisa-
tion is no security panacea.

Open in new window


Author Closing Comment

ID: 34106430
Thanks for the research info - excellent article and exactly what I was looking for.

Featured Post

WEBINAR: GDPR Implemented - Tips & Lessons Learned

Join the WatchGuard team on Thursday, March 29th as we recount some valuable lessons learned in weighing the needs of a business against the new regulatory environment, look ahead at the two months left before implementation, and help you understand the steps you can take today!

Question has a verified solution.

Are you are experiencing a similar issue? Get a personalized answer when you ask a related question.

Have a better answer? Share it in a comment.

Join & Write a Comment

Virtualization software lets you run different versions of Windows, Ubuntu Linux and other versions of Linux all at the same time, rather than running each one directly from your computer's hard drive.
The article describes step by step how to validate the SRA software certificate once installed on the Site Recovery Manager server. I hope it will be very useful for all administrators of virtualized environments.
In this video tutorial I show you the main steps to install and configure  a VMware ESXi6.0 server. The video has my comments as text on the screen and you can pause anytime when needed. Hope this will be helpful. Verify that your hardware and BIO…
Video by: ITPro.TV
In this episode Don builds upon the troubleshooting techniques by demonstrating how to properly monitor a vSphere deployment to detect problems before they occur. He begins the show using tools found within the vSphere suite as ends the show demonst…

624 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question