{"id":10681,"date":"2022-07-08T02:30:47","date_gmt":"2022-07-08T02:30:47","guid":{"rendered":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?post_type=session&#038;p=10681"},"modified":"2024-09-03T02:25:00","modified_gmt":"2024-09-03T02:25:00","slug":"dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization","status":"publish","type":"session","link":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/","title":{"rendered":"Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization"},"content":{"rendered":"<div class=\"simple_format\">\n<p><strong><a href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/materials\/D1T1%20-%20Dragon%20Slaying%20Guide%20-%20Bug%20Hunting%20In%20VMware%20Device%20Virtualization%20-%20Z.%20Li,%20H.%20Zheng,%20Y.%20Liu%20&amp;%20J.%20Huang.pdf\">PRESENTATION SLIDES<\/a><\/strong><\/p>\n<p style=\"text-align: justify;\">VMware Workstation\/ESXi is one of the most popular commercial virtualization software on the market. Its complex virtualization system design and critical position in infrastructure have made it a top target for hackers over the long term. For security researchers, discovering virtualization escape vulnerabilities in the VMware hypervisor is as challenging as confronting a dragon in a role-playing game.<\/p>\n<p style=\"text-align: justify;\">In this presentation, we <strong>will unveil a new attack surface: Device Virtualization in VMKernel.<\/strong> This is an unknown territory that has not been explored by security researchers to date. Furthermore,<strong> this attack perspective has not been considered in VMware&#8217;s defense system, and its existing sandbox mechanisms are theoretically incapable of defending against attacks initiated from VMKernel.\u00a0<\/strong><\/p>\n<p style=\"text-align: justify;\">During the analysis of this attack surface and reverse engineering of the VMware Hypervisor, <strong>we discovered 8 vulnerabilities related to device virtualization, 3 of them have been assigned CVE number (some vulnerabilities have even been successfully exploited in Tianfu Cup), and the remaining 5 of our vulnerabilities have been officially confirmed by VMware.<\/strong><\/p>\n<p style=\"text-align: justify;\">About how we discover the attack surface of VMKernel and find 8 unknown vulnerabilities, we will progressively explain from three parts:<\/p>\n<ul>\n<li style=\"text-align: justify;\">VMware Virtualization Details<\/li>\n<\/ul>\n<p>We will delve into the loading process of vmm, the implementation of data sharing between vmm and vmx, and VMware&#8217;s UserRPC, which facilitates communication between the Hypervisor and the Host. These mechanisms are crucial in virtual device emulation.<\/p>\n<ul>\n<li style=\"text-align: justify;\">USB Virtualization Bug Hunting<\/li>\n<\/ul>\n<p>We will address security issues in various parts of the USB system, including the host controller, VUsb middleware, and VUsb backend devices, based on the vulnerabilities we have unearthed.<\/p>\n<ul>\n<li style=\"text-align: justify;\">SCSI Virtualization Bug Hunting<\/li>\n<\/ul>\n<p>We will primarily discuss the similarities and differences in SCSI-related device emulation in the virtual disk system between VMware Workstation and ESXi. Additionally, we will cover design flaws related to disk device emulation that we discovered in VMKernel.<\/p>\n<\/div>\n","protected":false},"template":"","class_list":["post-10681","session","type-session","status-publish","hentry"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v23.3 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>HITBSecConf2024 - Bangkok - Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization<\/title>\n<meta name=\"description\" content=\"In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This is an unknown territory that has not been explored by security researchers to date.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization\" \/>\n<meta property=\"og:description\" content=\"In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This is an unknown territory that has not been explored by security researchers to date.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/\" \/>\n<meta property=\"og:site_name\" content=\"HITBSecConf2024 - Bangkok\" \/>\n<meta property=\"article:modified_time\" content=\"2024-09-03T02:25:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/06\/yue.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"300\" \/>\n\t<meta property=\"og:image:height\" content=\"300\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data1\" content=\"2 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"WebPage\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/\",\"name\":\"HITBSecConf2024 - Bangkok - Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization\",\"isPartOf\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\"},\"datePublished\":\"2022-07-08T02:30:47+00:00\",\"dateModified\":\"2024-09-03T02:25:00+00:00\",\"description\":\"In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This is an unknown territory that has not been explored by security researchers to date.\",\"breadcrumb\":{\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Session\",\"item\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website\",\"url\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/\",\"name\":\"HITBSecConf2024 - Bangkok\",\"description\":\"August 26 - 30 @ InterContinental\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}\"},\"query-input\":\"required name=search_term_string\"}],\"inLanguage\":\"en-US\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"HITBSecConf2024 - Bangkok - Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization","description":"In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This is an unknown territory that has not been explored by security researchers to date.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/","og_locale":"en_US","og_type":"article","og_title":"Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization","og_description":"In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This is an unknown territory that has not been explored by security researchers to date.","og_url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/","og_site_name":"HITBSecConf2024 - Bangkok","article_modified_time":"2024-09-03T02:25:00+00:00","og_image":[{"width":300,"height":300,"url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-content\/uploads\/sites\/22\/2024\/06\/yue.jpg","type":"image\/jpeg"}],"twitter_card":"summary_large_image","twitter_misc":{"Est. reading time":"2 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"WebPage","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/","name":"HITBSecConf2024 - Bangkok - Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization","isPartOf":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website"},"datePublished":"2022-07-08T02:30:47+00:00","dateModified":"2024-09-03T02:25:00+00:00","description":"In this presentation, we will unveil a new attack surface: Device Virtualization in VMKernel. This is an unknown territory that has not been explored by security researchers to date.","breadcrumb":{"@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/dragon-slaying-guide-bug-hunting-in-vmware-device-virtualization\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/"},{"@type":"ListItem","position":2,"name":"Session","item":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/session\/"},{"@type":"ListItem","position":3,"name":"Dragon Slaying Guide: Bug Hunting In VMware Device Virtualization"}]},{"@type":"WebSite","@id":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/#website","url":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/","name":"HITBSecConf2024 - Bangkok","description":"August 26 - 30 @ InterContinental","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/?s={search_term_string}"},"query-input":"required name=search_term_string"}],"inLanguage":"en-US"}]}},"_links":{"self":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/session\/10681"}],"collection":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/session"}],"about":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/types\/session"}],"wp:attachment":[{"href":"https:\/\/conference.hitb.org\/hitbsecconf2024bkk\/wp-json\/wp\/v2\/media?parent=10681"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}