1.3 Verify no unauthorized kernel modules are loaded on the host

Information

ESXi hosts by default do not permit the loading of kernel modules that lack valid digital
signatures. This feature can be overridden which would result in unauthorized kernel
modules to be loaded.

*Rationale*

VMware provides digital signatures for kernel modules. By default the ESXi host does not
permit loading of kernel modules that lack a valid digital signature. However, this behavior
can be overridden allowing unauthorized kernel modules to be loaded. Untested or
malicious kernel modules loaded on the ESXi host can put the host at risk for instability
and/or exploitation.

NOTE: Nessus has not performed this check. Please review the benchmark to ensure target compliance.

Solution

To implement the recommended configuration state, run the following PowerCLI
command-# To disable a module-
$ESXCli = Get-EsxCli -VMHost MyHost
$ESXCli.system.module.set($false, $false, 'MyModuleName')

Note- evacuate VMs and place the host into maintenance mode before disabling kernel
modules.

See Also

https://workbench.cisecurity.org/files/145

Item Details

Category: SYSTEM AND SERVICES ACQUISITION

References: 800-53|SA-22

Plugin: VMware

Control ID: 7727067f48f6d86e5f532e4841fc1ccc50b711957e674053752ed4199c45beb3