VMware Tools Flaw Let Attackers Escalate Privileges

Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058. These vulnerabilities were associated with Local Privilege Escalation and SAML Token Signature Bypass.

The severities of these vulnerabilities are 7.5 (High) and 7.8 (High), respectively. One of these vulnerabilities existed in macOS. However,  VMware has released patches and security advisories for fixing these vulnerabilities.

CVE-2023-34057: Local Privilege Escalation Vulnerability

A threat actor with local user privilege to a guest virtual machine can exploit this vulnerability and gain elevated privileges within the virtual machine. The severity of this vulnerability is given as 7.8 (High). 

CVE-2023-34058: SAML Token Signature Bypass

As a prerequisite, a threat actor requires “guest operations privilege” to exploit this vulnerability. This privilege controls the ability to interact with files and applications inside a virtual machine’s guest operating system for exploiting this vulnerability. 

A threat actor with this privilege can exploit this vulnerability on a target virtual machine and elevate their privileges if that target virtual machine has been assigned with a more privileged Guest Alias. The severity for this vulnerability has been given as 7.5 (High).

Affected Products

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Tools12.x.x, 11.x.x, 10.3.xmacOSCVE-2023-340577.8Important12.1.1NoneNone
VMware Tools12.x.x, 11.x.x, 10.3.xWindowsCVE-2023-34057N/AN/AUnaffectedN/AN/A
VMware Tools12.x.x, 11.x.x, 10.3.xmacOSCVE-2023-34058N/AN/AUnaffectedN/AN/A
VMware Tools12.x.x, 11.x.x, 10.3.xWindowsCVE-2023-340587.5Important12.3.5NoneNone

Users of these products are recommended to upgrade to the latest version in order to prevent these vulnerabilities from getting exploited.

Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.

Eswar

Eswar is a Cyber security content editor with a passion for creating captivating and informative content. With years of experience under his belt in Cyber Security, he is covering Cyber Security News, technology and other news.

Recent Posts

Cisco AnyConnect VPN Server Vulnerability Allows Attackers to Trigger DoS

Cisco has disclosed a significant vulnerability in its AnyConnect VPN Server for Meraki MX and Z Series…

2 hours ago

New Trinda Malware Targets Android Devices by Replacing Phone Numbers During Calls

Kaspersky Lab has uncovered a new version of the Triada Trojan, a sophisticated malware targeting…

2 hours ago

DarkCloud Stealer Uses Weaponized .TAR Archives to Target Organizations and Steal Passwords

A recent cyberattack campaign leveraging the DarkCloud stealer has been identified, targeting Spanish companies and…

2 hours ago

SonicWall Firewall Vulnerability Enables Unauthorized Access

Researchers from Bishop Fox have successfully exploited CVE-2024-53704, an authentication bypass vulnerability that affects SonicWall firewalls.…

2 hours ago

Russian Seashell Blizzard Targets Organizations Using Custom-Built Hacking Tools

Seashell Blizzard, also known as APT44, Sandworm, and Voodoo Bear, has emerged as a sophisticated…

3 hours ago

EvilCorp and RansomHub Collaborate to Launch Worldwide Attacks on Organizations

EvilCorp, a sanctioned Russia-based cybercriminal enterprise, has been observed collaborating with RansomHub, one of the…

3 hours ago