Two high vulnerabilities have been discovered in VMware Tools, which were assigned with CVE-2023-34057 and CVE-2023-34058. These vulnerabilities were associated with Local Privilege Escalation and SAML Token Signature Bypass.
The severities of these vulnerabilities are 7.5 (High) and 7.8 (High), respectively. One of these vulnerabilities existed in macOS. However, VMware has released patches and security advisories for fixing these vulnerabilities.
A threat actor with local user privilege to a guest virtual machine can exploit this vulnerability and gain elevated privileges within the virtual machine. The severity of this vulnerability is given as 7.8 (High).
As a prerequisite, a threat actor requires “guest operations privilege” to exploit this vulnerability. This privilege controls the ability to interact with files and applications inside a virtual machine’s guest operating system for exploiting this vulnerability.
A threat actor with this privilege can exploit this vulnerability on a target virtual machine and elevate their privileges if that target virtual machine has been assigned with a more privileged Guest Alias. The severity for this vulnerability has been given as 7.5 (High).
Product | Version | Running On | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
VMware Tools | 12.x.x, 11.x.x, 10.3.x | macOS | CVE-2023-34057 | 7.8 | Important | 12.1.1 | None | None |
VMware Tools | 12.x.x, 11.x.x, 10.3.x | Windows | CVE-2023-34057 | N/A | N/A | Unaffected | N/A | N/A |
VMware Tools | 12.x.x, 11.x.x, 10.3.x | macOS | CVE-2023-34058 | N/A | N/A | Unaffected | N/A | N/A |
VMware Tools | 12.x.x, 11.x.x, 10.3.x | Windows | CVE-2023-34058 | 7.5 | Important | 12.3.5 | None | None |
Users of these products are recommended to upgrade to the latest version in order to prevent these vulnerabilities from getting exploited.
Protect yourself from vulnerabilities using Patch Manager Plus to patch over 850 third-party applications quickly. Try a free trial to ensure 100% security.
Hackers prefer phishing as it exploits human vulnerabilities rather than technical flaws which make it a highly effective and low-cost…
A very important message from the Norwegian National Cyber Security Centre (NCSC) says that Secure Socket Layer/Transport Layer Security (SSL/TLS)…
Linux is widely used in numerous servers, cloud infrastructure, and Internet of Things devices, which makes it an attractive target…
ViperSoftX malware, known for stealing cryptocurrency information, now leverages Tesseract, an open-source OCR engine, to target infected systems, which extracts…
Santander has confirmed that there was a major data breach that affected its workers and customers in Spain, Uruguay, and…
The U.S. government has offered a prize of up to $5 million for information that leads to the arrest and…