This article documents the VMware ESXi mitigations required to address the security vulnerabilities documented in VMSA-2022-0016
These vulnerabilities are only applicable to virtual environments with a PCI passthrough (VMDirectPath I/O pass-through) device configured. Ensuring that no virtual machine has such a configuration can be considered a viable workaround that will prevent any exploitation.
In addition, VMware have provided a release of both VMware ESXi 6.7 and VMware ESXi 7.0 which includes updates that allow for a new advanced setting named "VMkernel.Boot.forceHyperthreadingMitigation" to be configured. Once enabled, this will ensure that the ESXi host will be running the "ESXi Side-Channel-Aware Scheduler v2 (SCAv2)". This is a required step.
Enabling this option will impose the same performance impacts as the SCAv2 introduced in ESXi6.7U2.
VMware vSphere ESXi 6.7
VMware vSphere 7.0.x
Note: For VMware Cloud Foundation (VCF) Environments, Please follow KBs documented in the 'Impacted Product Suites that Deploy Response Matrix Components' table found in VMSA-2022-0016 first. Then, proceed with the steps mentioned below to add the advanced setting.
1) Patch the VMware ESXi host to the "Fixed Version" documented below
ESXi Version | Fixed Version |
VMware ESXi 7.0 | ESXi 7.0 U3e (Release Notes) |
VMware ESXi 6.7 | ESXi 6.7 P07 (Release Notes) |
VMware ESXi 6.5 | Upgrade to 7.0 U3e (Preferred) or 6.7 P07 or Make sure VMs are not using PCI pass-through devices or Use PCI or PCIe passthrough to a virtual machine only if a trusted entity owns and administers the virtual machine. |
2) Enable the "VMkernel.Boot.forceHyperthreadingMitigation" advanced setting by changing the value to "True"
Change log: