There are no reports of violations when the vm, which starts to run malicious code, can infect the host. However, theoretical issues were raised on this issue. Worse, if vm gets infected, most likely it will launch a bot that will scan your network (including, possibly, the host), and can easily detect a hole in your protection.
Thus, even if you do not care about vm, it is highly advisable to adopt a strict strategy to protect these machines with AV software and scheduled updates. This can be challenging if you do not change systems frequently. Therefore, as a rule, itβs not bad to plan the time every few weeks when you turn on all vm / images and update them all.
If you mention a specific provider or virtual host package, more specific advice may be provided regarding the development of your vm security protocol.
source share