VMware Tools Flaw Let Attackers Escalate Privileges

Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058. These vulnerabilities were associated with Local Privilege Escalation and SAML Token Signature Bypass.

The severities of these vulnerabilities are 7.5 (High) and 7.8 (High), respectively. One of these vulnerabilities existed in macOS. However,  VMware has released patches and security advisories for fixing these vulnerabilities.

CVE-2023-34057: Local Privilege Escalation Vulnerability

A threat actor with local user privilege to a guest virtual machine can exploit this vulnerability and gain elevated privileges within the virtual machine. The severity of this vulnerability is given as 7.8 (High). 

CVE-2023-34058: SAML Token Signature Bypass

As a prerequisite, a threat actor requires “guest operations privilege” to exploit this vulnerability. This privilege controls the ability to interact with files and applications inside a virtual machine’s guest operating system for exploiting this vulnerability. 

A threat actor with this privilege can exploit this vulnerability on a target virtual machine and elevate their privileges if that target virtual machine has been assigned with a more privileged Guest Alias. The severity for this vulnerability has been given as 7.5 (High).

Affected Products

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Tools12.x.x, 11.x.x, 10.3.xmacOSCVE-2023-340577.8Important12.1.1NoneNone
VMware Tools12.x.x, 11.x.x, 10.3.xWindowsCVE-2023-34057N/AN/AUnaffectedN/AN/A
VMware Tools12.x.x, 11.x.x, 10.3.xmacOSCVE-2023-34058N/AN/AUnaffectedN/AN/A
VMware Tools12.x.x, 11.x.x, 10.3.xWindowsCVE-2023-340587.5Important12.3.5NoneNone

Users of these products are recommended to upgrade to the latest version in order to prevent these vulnerabilities from getting exploited.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Eswar

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Implementing Identity First Security for Zero Trust Architectures

Zero Trust is a security framework that operates under the assumption that no implicit trust…

7 hours ago

InvokeADCheck – New Powershell Module for Active Directory Assessment

Orange Cyberdefense has announced the development of InvokeADCheck, a new PowerShell module designed to streamline…

9 hours ago

Detecting Malicious Activities With Traffic Distribution Systems

Traffic Distribution Systems (TDS) have emerged as critical tools for both legitimate and malicious purposes,…

9 hours ago

Hackers Deploy Advanced Social Engineering Tactics in Phishing Attacks

Cybercriminals are evolving their phishing methods, employing more sophisticated social engineering tactics to deceive their…

9 hours ago

Cybercriminals Exploit Compromised Email Servers for Fraudulent Campaigns

Trend Micro's Managed XDR team has recently investigated a sophisticated Business Email Compromise (BEC) attack…

9 hours ago

Identifying Cyber Attack Patterns Through Threat Actor Infrastructure Analysis

Kudelski Security Research recently published an article detailing advanced methods for tracking and analyzing threat…

9 hours ago