T 3.101 Improper use of guest tools in virtual IT systems

For many virtualisation products, so-called guest tools can be installed in the virtual IT systems. On the one hand, these guest tools can be used to provide the device drivers required for operating system virtualisation for virtual or emulated devices such as network cards, hard disks or graphics cards. On the other, they provide a number of functions for virtual machines. Such functions are for instance:

These functions increase the user-friendliness of the virtual IT systems and, in addition, allow an automated management of the operating states (switching on/off, booting and shutting down) of virtual IT systems by the virtualisation server.

Shutting down the system without logging in/interaction

If the function for shutting down an IT system is used by an administrator of the virtualisation server, more restrictive configuration settings, if any, within the virtual IT system itself are circumvented or policies violated, which prohibit restarts or shutdowns without proper authorisation.

Access to CD/DVD drives or floppy disk drives

With the corresponding configuration, the guest tools also allow direct access to the drives of the virtualisation server. For example, access to the physical CD drive connected in the virtualisation server, might be thus possible from a virtual IT-System. A CD-ROM with confidential data which was inserted in the drive of the virtualisation server to transfer the data contained on the CD-ROM to a certain virtual IT system can thus also be accessed from other virtual instances. The confidentiality of the data is threatened, as data was possibly read by unauthorised persons.

For some virtualisation products, it is also possible to open the CD or DVD drive compartment of the virtualisation server from a virtual IT system using the guest tools, when they are configured accordingly. The drive could be damaged, if, for example, it hits the door of the server cabinet or is stopped by a decorative screen at the server housing.

Examples: