iTnews Asia
  • Home
  • News
  • Security

VMware patches critical vulnerability

VMware patches critical vulnerability

Issues fixes for Workstation, Fusion products.

By Richard Chirgwin on Apr 26, 2023 12:01PM

VMware has patched a critical Bluetooth bug in its Workstation Pro, Workstation Player, and Fusion products, disclosed by STAR Labs at Pwn2Own.

The vendor’s advisory explains that CVE-2023-20869 is a stack-based overflow in the Bluetooth device-sharing functionality.

Even though it’s only exploitable by an attacker with local virtual machine admin privileges, the company still rated the bug as “critical”, with a CVSS score of 9.3.

An attacker could “exploit this issue to execute code as the virtual machine's VMX process running on the host”, the company said.

The advisory also details several other bugs attributed to STAR Labs, rated as “high” severity.

CVE-2023-20870 is an information disclosure vulnerability due to an out-of-bounds read, giving the attacker a vector to read privileged information in hypervisor memory.

CVE-2023-20871 only affects Fusion. It’s a local privilege escalation bug that lets an attacker get root access to the host operating system.

Finally, CVE-2023-20872 is an out-of-bounds read in the software’s SCSI CD/DVD emulation.

“A malicious attacker with access to a virtual machine that has a physical CD/DVD drive attached and configured to use a virtual SCSI controller may be able to exploit this vulnerability to execute code on the hypervisor from a virtual machine,” the advisory stated.

Vulnerable versions of Workstation are in the 17.x branch and have been patched in 17.0.2, while the Fusion 13.x branch has been patched in 13.0.2.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
fusion security vmware

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.