ESXi Firewall allows UDP source port 53 traffic to all destination ports
search cancel

ESXi Firewall allows UDP source port 53 traffic to all destination ports

book

Article ID: 341588

calendar_today

Updated On:

Products

VMware vSphere ESXi

Issue/Introduction

Vulnerability scanners may flag this behavior as an issue

Example vulnerability scanner output:

Your firewall policy seems to allow UDP packets with a specific source port (for example, port 53) to pass through while it blocks UDP packets to the same destination ports but with a random source port.

Environment

VMware vSphere ESXi 5.5
VMware vSphere ESXi 6.0
VMware vSphere ESXi 7.0
VMware vSphere ESXi 8.0

Resolution

This is working as designed, as the ESXi hypervisor utilizes  a stateless rather than a stateful firewall, and behavior expected as per ESXi's DNS client implementation.

The ESXi DNS client uses 'high' ephemeral ports (greater than port 49152) for DNS queries; however, some vulnerability scanners may still flag this behavior as a potential security issue.
To better protect your vSphere environment, you may wish to configure an external firewall to block incoming DNS traffic from ports lower than 49152.
DNS queries may also be further restricted by configuring the allowed IP addresses for DNS communication within the ESXi host firewall. 
https://techdocs.broadcom.com/us/en/vmware-cis/vsphere/vsphere/8-0/vsphere-security-8-0.html