{"id":1871,"date":"2018-11-15T08:32:00","date_gmt":"2018-11-15T08:32:00","guid":{"rendered":"http:\/\/blog.nsfocusglobal.com\/?p=1871"},"modified":"2018-11-15T08:32:00","modified_gmt":"2018-11-15T08:32:00","slug":"vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert","status":"publish","type":"post","link":"https:\/\/nsfocusglobal.com\/pt-br\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/","title":{"rendered":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert"},"content":{"rendered":"<h2>Overview<\/h2>\n<p>Recently, VMware has released a security advisory to document the remediation of two critical vulnerabilities (CVE-2018-6981 and CVE-2018-6982) in VMware ESXi, Workstation, and Fusion. The two vulnerabilities were disclosed by a Chinese cybersecurity firm Chaitin Tech at the international hacking contest GeekPwn2018.<\/p>\n<p><!--more--><\/p>\n<p>The two vulnerabilities exist because VMware ESXi, Fusion, and Workstation contain uninitialized stack memory in vmxnet3 virtual network adapter. The vulnerability CVE-2018-6981 could allow a guest user to execute code on the host, while the CVE-2018-6982 vulnerability could result in information leakage from the host to a guest. Vulnerable products with vmxnet3 enabled will be exposed to security risks, while non-vmxnet3 virtual network adapters are not affected by the two vulnerabilities in question.<\/p>\n<p>Reference links:<\/p>\n<p><a href=\"https:\/\/blogs.vmware.com\/security\/2018\/11\/vmware-and-the-geekpwn2018-event.html\"><strong>https:\/\/blogs.vmware.com\/security\/2018\/11\/vmware-and-the-geekpwn2018-event.html<\/strong><\/a><\/p>\n<p><strong>https:\/\/www.vmware.com\/security\/advisories\/VMSA-2018-0027.html<\/strong><\/p>\n<h2>Products Affected by CVE-2018-6981 and Related Patches\/ Updates<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"103\">Product<\/td>\n<td width=\"72\">Version<\/td>\n<td width=\"92\">Platform<\/td>\n<td width=\"124\">Severity Level<\/td>\n<td width=\"162\">Related Patch\/Update<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">ESXi<\/td>\n<td width=\"72\">6.7<\/td>\n<td width=\"92\">ESXi<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">ESXi670-201811401-BG<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">ESXi<\/td>\n<td width=\"72\">6.5<\/td>\n<td width=\"92\">ESXi<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">ESXi650-201811301-BG<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">ESXi<\/td>\n<td width=\"72\">6.0<\/td>\n<td width=\"92\">ESXi<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">ESXi600-201811401-BG<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Workstation<\/td>\n<td width=\"72\">15.x<\/td>\n<td width=\"92\">All<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">15.0.1<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Workstation<\/td>\n<td width=\"72\">14.x<\/td>\n<td width=\"92\">All<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">14.1.4<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Fusion<\/td>\n<td width=\"72\">11.x<\/td>\n<td width=\"92\">OS X<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">11.0.1<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Fusion<\/td>\n<td width=\"72\">10.x<\/td>\n<td width=\"92\">OS X<\/td>\n<td width=\"124\">Critical<\/td>\n<td width=\"162\">10.1.4<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2>Products Affected by CVE-2018-6982 and Related Patches\/Updates<\/h2>\n<table>\n<tbody>\n<tr>\n<td width=\"103\">Product<\/td>\n<td width=\"72\">Version<\/td>\n<td width=\"92\">Platform<\/td>\n<td width=\"124\">Severity Level<\/td>\n<td width=\"162\">Related Patch\/Update<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">ESXi<\/td>\n<td width=\"72\">6.7<\/td>\n<td width=\"92\">ESXi<\/td>\n<td width=\"124\">Important<\/td>\n<td width=\"162\">ESXi670-201811401-BG<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">ESXi<\/td>\n<td width=\"72\">6.5<\/td>\n<td width=\"92\">ESXi<\/td>\n<td width=\"124\">Important<\/td>\n<td width=\"162\">ESXi650-201811301-BG<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">ESXi<\/td>\n<td width=\"72\">6.0<\/td>\n<td width=\"92\">ESXi<\/td>\n<td width=\"124\">N\/A<\/td>\n<td width=\"162\">Unaffected<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Workstation<\/td>\n<td width=\"72\">All<\/td>\n<td width=\"92\">All<\/td>\n<td width=\"124\">N\/A<\/td>\n<td width=\"162\">Unaffected<\/td>\n<\/tr>\n<tr>\n<td width=\"103\">Fusion<\/td>\n<td width=\"72\">All<\/td>\n<td width=\"92\">OS X<\/td>\n<td width=\"124\">N\/A<\/td>\n<td width=\"162\">Unaffected<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<h2>Solution<\/h2>\n<p>The vendor has provided related patches and updates for vulnerable products (for details, see the Related Patch\/Update column of the preceding table). Affected users are advised to download the related patch or update as soon as possible from one of the following links and install it.<\/p>\n<p>&nbsp;<\/p>\n<p><strong>ESXi 6.7 <\/strong><\/p>\n<p>Download address of the related patch\/update and documentation:<\/p>\n<p><strong>https:\/\/my.vmware.com\/group\/vmware\/patch\u00a0\u00a0\u00a0 <\/strong><\/p>\n<p><strong>https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.7\/rn\/esxi670-201811001.html<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>ESXi 6.5\u00a0 <\/strong><\/p>\n<p>Download address of the related patch\/update and documentation:<\/p>\n<p><strong>https:\/\/my.vmware.com\/group\/vmware\/patch\u00a0\u00a0 <\/strong><\/p>\n<p><strong>https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.5\/rn\/esxi650-201811001.html<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>ESXi 6.0<\/strong><\/p>\n<p>Download address of the related patch\/update and documentation:<\/p>\n<p><strong>https:\/\/my.vmware.com\/group\/vmware\/patch\u00a0\u00a0\u00a0 <\/strong><\/p>\n<p><strong>https:\/\/docs.vmware.com\/en\/VMware-vSphere\/6.0\/rn\/esxi600-201811001.html<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>VMware Workstation Pro<\/strong><\/p>\n<p>Download address of the related patch\/update and documentation:<\/p>\n<p><strong>https:\/\/www.vmware.com\/go\/downloadworkstation<\/strong><\/p>\n<p><strong>https:\/\/docs.vmware.com\/en\/VMware-Workstation-Pro\/index.html<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>VMware Workstation Player<\/strong><\/p>\n<p>Download address of the related patch\/update and documentation:<\/p>\n<p><strong>https:\/\/www.vmware.com\/go\/downloadplayer<\/strong><\/p>\n<p><strong>https:\/\/docs.vmware.com\/en\/VMware-Workstation-Player\/index.html<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><strong>VMware Fusion Pro\/Fusion<\/strong><\/p>\n<p>Download address of the related patch\/update and documentation:<\/p>\n<p><strong>https:\/\/www.vmware.com\/go\/downloadfusion\u00a0 <\/strong><\/p>\n<p><strong>https:\/\/docs.vmware.com\/en\/VMware-Fusion\/index.html\u00a0 <\/strong><\/p>\n<h2><strong>Statement<\/strong><\/h2>\n<p>This advisory is only used to describe a potential risk. NSFOCUS does not provide any commitment or promise on this advisory. NSFOCUS and the author will not bear any liability for any direct and\/or indirect consequences and losses caused by transmitting and\/or using this advisory. NSFOCUS reserves all the rights to modify and interpret this advisory. Please include this statement paragraph when reproducing or transferring this advisory. Do not modify this advisory, add\/delete any information to\/from it, or use this advisory for commercial purposes without permission from NSFOCUS.<\/p>\n<h2><strong>About NSFOCUS<\/strong><\/h2>\n<p>NSFOCUS IB is a wholly owned subsidiary of NSFOCUS, an enterprise application and network security provider, with operations in the Americas, Europe, the Middle East, Southeast Asia and Japan. NSFOCUS IB has a proven track record of combatting the increasingly complex cyber threat landscape through the construction and implementation of multi-layered defense systems. The company&#8217;s Intelligent Hybrid Security strategy utilizes both cloud and on-premises security platforms, built on a foundation of real-time global threat intelligence, to provide unified, multi-layer protection from advanced cyber threats.<\/p>\n<p>For more information about NSFOCUS, please visit:<\/p>\n<p>https:\/\/www.nsfocusglobal.com<\/p>\n<p>NSFOCUS, NSFOCUS IB, and NSFOCUS, INC. are trademarks or registered trademarks of NSFOCUS, Inc. All other names and trademarks are property of their respective firms.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Overview Recently, VMware has released a security advisory to document the remediation of two critical vulnerabilities (CVE-2018-6981 and CVE-2018-6982) in VMware ESXi, Workstation, and Fusion. The two vulnerabilities were disclosed by a Chinese cybersecurity firm Chaitin Tech at the international hacking contest GeekPwn2018.<\/p>\n","protected":false},"author":1,"featured_media":7728,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_coblocks_attr":"","_coblocks_dimensions":"","_coblocks_responsive_height":"","_coblocks_accordion_ie_support":"","footnotes":""},"categories":[17,20],"tags":[44,189,190,721],"class_list":["post-1871","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-vulnerability-analysis","category-uncategorized","tag-about-nsfocus","tag-cve-2018-6981","tag-cve-2018-6982","tag-vmware-virtual-machine-escape-vulnerabilities"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.5 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/\" \/>\n<meta property=\"og:locale\" content=\"pt_BR\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS\" \/>\n<meta property=\"og:description\" content=\"Overview Recently, VMware has released a security advisory to document the remediation of two critical vulnerabilities (CVE-2018-6981 and CVE-2018-6982)\" \/>\n<meta property=\"og:url\" content=\"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/\" \/>\n<meta property=\"og:site_name\" content=\"NSFOCUS\" \/>\n<meta property=\"article:published_time\" content=\"2018-11-15T08:32:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg\" \/>\n<meta name=\"author\" content=\"NSFOCUS\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:title\" content=\"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS\" \/>\n<meta name=\"twitter:description\" content=\"Overview Recently, VMware has released a security advisory to document the remediation of two critical vulnerabilities (CVE-2018-6981 and CVE-2018-6982)\" \/>\n<meta name=\"twitter:image\" content=\"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg\" \/>\n<meta name=\"twitter:label1\" content=\"Escrito por\" \/>\n\t<meta name=\"twitter:data1\" content=\"NSFOCUS\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. tempo de leitura\" \/>\n\t<meta name=\"twitter:data2\" content=\"3 minutos\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/\"},\"author\":{\"name\":\"NSFOCUS\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\"},\"headline\":\"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert\",\"datePublished\":\"2018-11-15T08:32:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/\"},\"wordCount\":682,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/1115.jpg\",\"keywords\":[\"About NSFOCUS\",\"CVE-2018-6981\",\"CVE-2018-6982\",\"VMware Virtual Machine Escape Vulnerabilities\"],\"articleSection\":[\"Threat Analysis\",\"Uncategorized\"],\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/\",\"name\":\"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/1115.jpg\",\"datePublished\":\"2018-11-15T08:32:00+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#breadcrumb\"},\"inLanguage\":\"pt-BR\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#primaryimage\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/1115.jpg\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2018\\\/11\\\/1115.jpg\",\"width\":584,\"height\":341,\"caption\":\"VMware ESXi logo with green icon.\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/nsfocusglobal.com\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#website\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"name\":\"NSFOCUS\",\"description\":\"Security Made Smart and Simple\",\"publisher\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/nsfocusglobal.com\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"pt-BR\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#organization\",\"name\":\"NSFOCUS\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"contentUrl\":\"https:\\\/\\\/nsfocusglobal.com\\\/wp-content\\\/uploads\\\/2024\\\/08\\\/logo-ns.png\",\"width\":248,\"height\":36,\"caption\":\"NSFOCUS\"},\"image\":{\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/nsfocusglobal.com\\\/#\\\/schema\\\/person\\\/fd9ab61c9c77a81bbd870f725cc0c61d\",\"name\":\"NSFOCUS\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"pt-BR\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g\",\"caption\":\"NSFOCUS\"},\"sameAs\":[\"https:\\\/\\\/nsfocusglobal.com\"],\"url\":\"https:\\\/\\\/nsfocusglobal.com\\\/pt-br\\\/author\\\/admin\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/","og_locale":"pt_BR","og_type":"article","og_title":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS","og_description":"Overview Recently, VMware has released a security advisory to document the remediation of two critical vulnerabilities (CVE-2018-6981 and CVE-2018-6982)","og_url":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/","og_site_name":"NSFOCUS","article_published_time":"2018-11-15T08:32:00+00:00","og_image":[{"url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg","type":"","width":"","height":""}],"author":"NSFOCUS","twitter_card":"summary_large_image","twitter_title":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS","twitter_description":"Overview Recently, VMware has released a security advisory to document the remediation of two critical vulnerabilities (CVE-2018-6981 and CVE-2018-6982)","twitter_image":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg","twitter_misc":{"Escrito por":"NSFOCUS","Est. tempo de leitura":"3 minutos"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#article","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/"},"author":{"name":"NSFOCUS","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d"},"headline":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert","datePublished":"2018-11-15T08:32:00+00:00","mainEntityOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/"},"wordCount":682,"commentCount":0,"publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg","keywords":["About NSFOCUS","CVE-2018-6981","CVE-2018-6982","VMware Virtual Machine Escape Vulnerabilities"],"articleSection":["Threat Analysis","Uncategorized"],"inLanguage":"pt-BR","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/","url":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/","name":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert - NSFOCUS","isPartOf":{"@id":"https:\/\/nsfocusglobal.com\/#website"},"primaryImageOfPage":{"@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#primaryimage"},"image":{"@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#primaryimage"},"thumbnailUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg","datePublished":"2018-11-15T08:32:00+00:00","breadcrumb":{"@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#breadcrumb"},"inLanguage":"pt-BR","potentialAction":[{"@type":"ReadAction","target":["https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/"]}]},{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#primaryimage","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2018\/11\/1115.jpg","width":584,"height":341,"caption":"VMware ESXi logo with green icon."},{"@type":"BreadcrumbList","@id":"https:\/\/nsfocusglobal.com\/vmware-virtual-machine-escape-vulnerabilities-cve-2018-6981-and-cve-2018-6982-threat-alert\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/nsfocusglobal.com\/"},{"@type":"ListItem","position":2,"name":"VMware Virtual Machine Escape Vulnerabilities (CVE-2018-6981 and CVE-2018-6982) Threat Alert"}]},{"@type":"WebSite","@id":"https:\/\/nsfocusglobal.com\/#website","url":"https:\/\/nsfocusglobal.com\/","name":"NSFOCUS","description":"Security Made Smart and Simple","publisher":{"@id":"https:\/\/nsfocusglobal.com\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/nsfocusglobal.com\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"pt-BR"},{"@type":"Organization","@id":"https:\/\/nsfocusglobal.com\/#organization","name":"NSFOCUS","url":"https:\/\/nsfocusglobal.com\/","logo":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/","url":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","contentUrl":"https:\/\/nsfocusglobal.com\/wp-content\/uploads\/2024\/08\/logo-ns.png","width":248,"height":36,"caption":"NSFOCUS"},"image":{"@id":"https:\/\/nsfocusglobal.com\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/nsfocusglobal.com\/#\/schema\/person\/fd9ab61c9c77a81bbd870f725cc0c61d","name":"NSFOCUS","image":{"@type":"ImageObject","inLanguage":"pt-BR","@id":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d3dc987908fc59791d261b1006d84eb931d15287261476b9384e690ed0c568de?s=96&d=mm&r=g","caption":"NSFOCUS"},"sameAs":["https:\/\/nsfocusglobal.com"],"url":"https:\/\/nsfocusglobal.com\/pt-br\/author\/admin\/"}]}},"_links":{"self":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1871","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/comments?post=1871"}],"version-history":[{"count":0,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/posts\/1871\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media\/7728"}],"wp:attachment":[{"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/media?parent=1871"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/categories?post=1871"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/nsfocusglobal.com\/pt-br\/wp-json\/wp\/v2\/tags?post=1871"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}