logo
How Virtual Patching Helps Protect Hypervisors Against Exploits

How Virtual Patching Helps Protect Hypervisors Against Exploits

Forbes08-08-2025
Austin Gadient is CTO & cofounder of Vali Cyber. Vali's product ZeroLock protects hypervisors and Linux systems from cyber attacks.
As cybersecurity leaders work to stay ahead of evolving threats, one challenge continues to expose a gap in enterprise risk posture: the delayed adoption of patches for known hypervisor vulnerabilities.
Take VMware ESXi, for example. Despite the availability of patches for high-impact vulnerabilities (CVE-2025-22224, 22225 and 22226), a significant number of systems remain unpatched months later. These flaws allow attackers to escalate from virtual machines to the hypervisor, placing entire workloads, data sets and business services at risk.
The situation is not uncommon. As organizations scale virtual environments and consolidate workloads, their ability to patch quickly and consistently has not kept pace. Patching schedules often conflict with uptime requirements. Risk acceptance around infrastructure-level threats remains high. And many endpoint security tools do not monitor hypervisors directly, leaving blind spots at one of the most critical layers in modern IT environments.
In this context, virtual patching has emerged as a strategic safeguard that offers real-time protection when immediate patching isn't possible.
The Hidden Cost Of Delayed Patching
Patching hypervisors isn't just a technical task, but it's a business risk decision. These systems run critical workloads and taking them offline—even briefly—can impact everything from customer-facing applications to internal operations.
In many environments, patching is delayed not out of negligence, but out of necessity:
• Downtime Risk: Taking a hypervisor offline can disrupt dozens, or hundreds, of virtual machines.
• Operational Fragility: If a patch introduces instability or fails, recovery is complex and time-consuming and introduces a window for exploitation.
Attackers target unpatched virtualization layers because they offer high impact with low visibility. The result is a widening gap between known vulnerabilities and the ability to remediate them safely—one that has real implications for compliance, continuity and executive accountability.
A Widening Threat Landscape
In virtualized environments, the cost of delayed patching is amplified. A single vulnerability at the hypervisor level can compromise every virtual machine it supports—introducing the potential for lateral movement, data exfiltration and operational shutdown.
Recent industry research underscores the scale of the challenge:
• There was a 180% increase in vulnerability exploitation as an initial attack vector between 2022 and 2023.
• 60% of organizations experienced a virtualization security incident last year, and 75% admit they have more VMs than they can effectively secure, opening the door for attackers to laterally move onto the hypervisor.
• 85% of organizations don't follow a regular patching schedule; 47% cite downtime as the main blocker.
These figures reveal a growing misalignment between threat velocity and organizational capacity to patch in time. Virtual patching helps close this gap—protecting systems during the high-risk window between disclosure and deployment.
Virtual Patching: A Practical And Strategic Solution
Virtual patching allows organizations to mitigate risk at runtime—without applying code-level changes or taking systems offline. Key use cases include:
• Zero-Day Defense: Protecting systems before vendor patches are released.
• Legacy Support: Securing environments that are no longer actively maintained.
• Operational Continuity: Maintaining uptime in regulated or 24/7 environments.
These capabilities are enabled through behavior-based detection and exploit prevention techniques that intercept attack behavior, even when the vulnerability itself remains.
Why Virtual Patching Matters To Security And Risk Leaders
For CISOs, CIOs and risk committees, virtual patching isn't just about technical coverage—it's about improving control maturity, audit readiness and business resilience.
Key benefits include:
• Real-time protection for known and unknown threats—even before patching.
• Support for compliance mandates (HIPAA, NIST, ISO) that expect timely risk mitigation.
• Evidence of due diligence, particularly when traditional patching timelines can't be met.
• Minimal business disruption, with deployment that doesn't require system downtime.
This strategy doesn't replace conventional patching—it complements it. For many enterprises, it offers a critical middle path between leaving systems exposed and taking workloads offline.
Getting Started With Virtual Patching
As organizations continue to virtualize, the hypervisor becomes a more attractive and impactful target. Protecting this layer is not just a technical necessity but also a business priority.
Virtual patching provides a way to safeguard operations, maintain compliance and respond to threats with speed. It reflects a broader shift toward layered, adaptive defense—especially critical in environments where timing can be the difference between resilience and breach.
Implementing virtual patching successfully starts with understanding what it takes operationally. Here are some important steps to effectively introduce virtual patching:
• Baseline your environment. Organizations need to know what workloads are running, where their hypervisors are located and what's exposed. Many environments may still lack a consolidated asset inventory or live risk map of their virtual infrastructure, making it hard to prioritize protection.
• Assign ownership. Virtual patching touches security, infrastructure and sometimes application teams. Without clear cross-functional accountability, policies may be inconsistently applied or ignored altogether. Even when a third-party vendor is involved, internal teams still need to define coverage, manage rule updates and ensure the solution stays aligned with changing risks.
• Tune your rules. Virtual patching often works by intercepting exploit behavior at runtime, but the rules need to be tailored. That means understanding typical behaviors versus malicious ones, especially in complex or high-availability environments. A misconfigured rule can cause disruptions or false positives that erode trust in the process.
• Integrate with existing workflows. Virtual patching is most effective when its alerts are fed into the existing security stack (like SIEMs, SOAR platforms and incident response workflows), so exploit attempts can be correlated with other events, prioritized correctly and acted on in real time.
• Require service level agreements (SLAs) from virtual patching providers. Virtual patching is only useful if a virtual patch that addresses a specific CVE can be provided shortly after the vulnerability is disclosed. It is reasonable to demand that providers live up to a timeline that correlates with issue severity.
Ultimately, virtual patching is a control that requires alignment across people, processes and technology. But for organizations with large-scale virtual infrastructure, it's also a necessary evolution that bridges the gap between ideal patching timelines and real-world constraints.
Forbes Technology Council is an invitation-only community for world-class CIOs, CTOs and technology executives. Do I qualify?
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

Google killed this feature so the Pixel 10 could have Qi2 wireless charging
Google killed this feature so the Pixel 10 could have Qi2 wireless charging

Android Authority

time2 minutes ago

  • Android Authority

Google killed this feature so the Pixel 10 could have Qi2 wireless charging

It was exciting when the first rumors started rolling in about the Pixel 10 series adopting Qi2 . This meant the Pixel 10 would become the second Android phone to support the standard. Now that Google's latest flagship has launched, this wireless charging functionality has been officially confirmed, along with a collection of compatible accessories . But it turns out Qi2 support is a bit of a double-edged sword, as its inclusion directly resulted in the removal of a different feature. Since the Pixel 5, Google's handsets have had a reverse wireless charging feature called Battery Share. This functionality allowed you to wirelessly charge other devices by placing them on the back of your Pixel phone. While Battery Share made it onto the Pixel 9 series, Google did not include this feature on the Pixel 10 series. The absence of this feature was noticed by the folks over at Droidreader (via 9to5Google) while looking at the technical specifications list on Google's website. After asking about the missing feature, Google sent the outlet the following statement: The Pixel 10 series features Qi2 magnetic wireless charging for more efficient and reliable wireless charging (…) The array of magnets creates a strong connection with the charger but presents a physical limitation for reverse wireless charging. While this means Battery Share is not currently available on the Pixel 10, we are constantly exploring future innovations to improve the Pixel experience. Google states that there were 'physical limitations for reverse wireless charging' after the Qi2 magnets were added. As a result, the tech giant did away with Battery Share on the Pixel 10. However, that doesn't mean that Battery Share is gone for good. The company adds that it is 'exploring future innovations.'

This $199 Hacking Device Will Probably Let Thieves Steal Your Car
This $199 Hacking Device Will Probably Let Thieves Steal Your Car

The Drive

time2 minutes ago

  • The Drive

This $199 Hacking Device Will Probably Let Thieves Steal Your Car

The latest car news, reviews, and features. We live in a timeline where one viral car theft trend is sure to be displaced by the next—and soon. The most dominant carjacking movement of the last few years has undeniably been the Kia Boys, whose members target Hyundai and Kia models with weak and easily tricked security systems. Thefts were so frequent and widespread for a while that recurring cable news segments warned the entire country about them. It now seems like another trend could be brewing as bad actors abuse a device called Flipper Zero to break into cars made by more than a dozen manufacturers. Investigative tech journalism site 404 Media published an in-depth report on the development Thursday morning. The story highlights how hackers are abusing the $199 Flipper Zero—a device defined by its creators as 'a versatile tool for hardware exploration, firmware flashing, debugging, and fuzzing'—to unlock vehicles without a key fob. We've written about these little white-and-orange gadgets before, first when nerds were using them to remotely open Teslas' charging doors, and then again later when someone found out how to use them to turn traffic lights green. The device in action. Flipper This new use for the Flipper Zero is far more nefarious. 404 Media spoke with a Russia-based hacker named Daniel, who says he developed the 'Unleashed' firmware that enables devices to execute more RFID and USB attacks. 'Maybe someone is using it to steal from cars or steal cars,' Daniel said, after alleging that the firmware is 'in demand' with locksmiths and car shop owners. He sells the Flipper Zero patches for either $600 or $1,000, depending on whether customers simply want the latest version or updates with further support. Daniel told 404 Media that he's sold the firmware to 150 or so customers in the past two years, and he works alongside a hacker who goes by Derrow. 'Kia Boys will be Flipper Boys by 2026,' explained Cody Kociemba, a reverse engineer otherwise known as Trikk, to 404 Media. It has such potential to scale because the tech can help thieves infiltrate a large list of vehicles. From Kias and Hyundais to Fords, Hondas, Subarus, VWs, and more, many of today's most popular makes and models are vulnerable. Nearly 200 specific examples are listed in this chart that Daniel uploaded at the beginning of a recent YouTube video. DjonixTV via YouTube Daniel claims it creates a 'shadow copy of the original key.' From what I can tell, however, it's only able to unlock the car—not start it. Still, that poses obvious security risks, even if someone can't drive away with your ride (yet). '​​Some cars like Kia are not using any protection at all, which makes it easy to open them,' Derrow wrote in an email. 'For other vendors you must know the source code, then you can open them too.' If you want a more technical breakdown of how the Flipper Zero hacks work, you should check out the full 404 Media report. Really, if you're interested at all, you ought to read it. The most important takeaway is that many, many of the world's most popular cars are largely defenseless against these hacks, and it's seemingly a matter of time before thieves can do more than break into them. Got a tip or question for the author? Contact them directly: caleb@

Gas power plants approved for Meta's $10B data center, and not everyone is happy
Gas power plants approved for Meta's $10B data center, and not everyone is happy

TechCrunch

time2 minutes ago

  • TechCrunch

Gas power plants approved for Meta's $10B data center, and not everyone is happy

When Meta selected a site in Louisiana for its largest data center to date, it signed a deal with Entergy to power the site with three massive natural gas power plants. Yesterday evening, a state regulator approved Entergy's plans. The power plants are expected to come online in 2028 and 2029, and at full strength, they'll generate 2.25 gigawatts of electricity. Ultimately, the AI data center could draw 5 gigawatts of power as its expanded. The power plant project has been controversial among Louisianans. One industry-affiliated group is concerned that Meta and Entergy will receive special treatment for a second part of the data center project, which involves building 1.5 gigawatts of solar power across the state, the Louisiana Illuminator reports. The group was formed by large companies, including Dow Chemical, Chevron, ExxonMobil, and others after they struggled to procure renewable power for their own operations. The other issue is that Meta's deal with Entergy lasts for 15 years, and at least one Louisiana Public Service Commission member expressed concern that ratepayers will take on the cost after the contract expires. Natural gas power plants typically operate for 30 years or more. Plus, power projects of this size tend to run over budget, according to the Union of Concerned Scientists, and ratepayers are often left with the bill. Ratepayers will also pay for a $550 million transmission line running to the data center, the organization said. Meta has been on a renewable power-buying spree, including a 100-megawatt purchase announced this week. However, these natural gas generators will make the company's 2030 net zero pledge significantly harder to achieve, locking in carbon dioxide emissions for decades to come. To offset the pollution on its balance sheet, Meta will have to buy credits from carbon removal projects.

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store