Skip to content

VMware Tools 10.3.x 11.x 12.x 12.3.5 Token Bypass

Fabien edited this page May 22, 2024 · 1 revision

Overview

The VMware Tools versions 10.3.x, 11.x, and 12.x below 12.3.5 contain a token bypass vulnerability. This vulnerability allows an attacker with local access to bypass security tokens, potentially leading to privilege escalation and unauthorized actions on the affected system.

  • Severity: High

Impact

  • Privilege Escalation: Attackers can exploit this vulnerability to gain elevated privileges on the affected system.
  • Unauthorized Access: Exploitation may allow attackers to perform unauthorized actions, compromising the integrity and security of the system.
  • Data Breach: Sensitive information could be accessed or modified by attackers leveraging this vulnerability.

Cause

  • Improper Token Handling: Flaws in the way VMware Tools handle security tokens.
  • Insufficient Security Controls: Lack of adequate security controls to prevent token bypass.
  • Legacy Code: Vulnerabilities in older versions of VMware Tools that have not been patched or updated.

Solution

The recommended solution is to upgrade VMware Tools to version 12.3.5 or later, which addresses this vulnerability.

  1. Download Latest Version:

    • Visit the VMware website to download the latest version of VMware Tools.
  2. Upgrade VMware Tools:

    • For Windows:

      1. Open VMware vSphere Client and select the virtual machine.
      2. Go to Guest > Install/Upgrade VMware Tools.
      3. Follow the on-screen instructions to complete the upgrade.
    • For Linux:

      1. Mount the VMware Tools ISO.

      2. Extract the contents and run the installer.

        tar -zxvf /mnt/cdrom/VMwareTools-*.tar.gz -C /tmp/
        cd /tmp/vmware-tools-distrib/
        sudo ./vmware-install.pl

Mitigation

If upgrading is not immediately possible, apply the following mitigations:

  • Restrict Local Access: Limit access to the affected systems to trusted users only.
  • Monitor System Activity: Use monitoring tools to detect unusual activities that may indicate exploitation attempts.

Examples

N/A

References

Additional Resources

Microsoft Related Vulnerabilities

SSL/TLS Related

OpenSSL Related Vulnerabilities

Apache Related Vulnerabilities

Java/Oracle Related Vulnerabilities

Miscellaneous Vulnerabilities

Miscellaneous

  • Template -> Use this template for new vulnerabilities
Clone this wiki locally