-
Notifications
You must be signed in to change notification settings - Fork 0
VMware Tools 10.3.x 11.x 12.x 12.3.5 Token Bypass
Fabien edited this page May 22, 2024
·
1 revision
The VMware Tools versions 10.3.x, 11.x, and 12.x below 12.3.5 contain a token bypass vulnerability. This vulnerability allows an attacker with local access to bypass security tokens, potentially leading to privilege escalation and unauthorized actions on the affected system.
- Severity: High
- Privilege Escalation: Attackers can exploit this vulnerability to gain elevated privileges on the affected system.
- Unauthorized Access: Exploitation may allow attackers to perform unauthorized actions, compromising the integrity and security of the system.
- Data Breach: Sensitive information could be accessed or modified by attackers leveraging this vulnerability.
- Improper Token Handling: Flaws in the way VMware Tools handle security tokens.
- Insufficient Security Controls: Lack of adequate security controls to prevent token bypass.
- Legacy Code: Vulnerabilities in older versions of VMware Tools that have not been patched or updated.
The recommended solution is to upgrade VMware Tools to version 12.3.5 or later, which addresses this vulnerability.
-
Download Latest Version:
- Visit the VMware website to download the latest version of VMware Tools.
-
Upgrade VMware Tools:
-
For Windows:
- Open VMware vSphere Client and select the virtual machine.
- Go to
Guest > Install/Upgrade VMware Tools
. - Follow the on-screen instructions to complete the upgrade.
-
For Linux:
-
Mount the VMware Tools ISO.
-
Extract the contents and run the installer.
tar -zxvf /mnt/cdrom/VMwareTools-*.tar.gz -C /tmp/ cd /tmp/vmware-tools-distrib/ sudo ./vmware-install.pl
-
-
If upgrading is not immediately possible, apply the following mitigations:
- Restrict Local Access: Limit access to the affected systems to trusted users only.
- Monitor System Activity: Use monitoring tools to detect unusual activities that may indicate exploitation attempts.
N/A
- Home - Return to this main page.
- Explore detailed vulnerability categories and entries via the sidebar.
- Microsoft Teams < 1.6.0.11166 Information Disclosure↗
- Microsoft Teams < 1.6.0.18681 RCE↗
- Microsoft Windows Unquoted Service Path Enumeration↗
- Microsoft XML Parser (MSXML) and XML Core Services Unsupported↗
- Security Updates for Microsoft .NET Framework↗
- Security Updates for Microsoft Office Products C2R↗
- Security Updates for Microsoft SQL Server↗
- Windows Defender Antimalware/Antivirus Signature Definition Check↗
- Windows Speculative Execution Configuration Check↗
- WinVerifyTrust Signature Validation CVE-2013-3900 Mitigation↗
- SSL Certificate Cannot Be Trusted↗
- SSL Certificate Chain Contains RSA Keys Less Than 2048 bits↗
- SSL Certificate with Wrong Hostname↗
- SSL Medium Strength Cipher Suites Supported (SWEET32)↗
- SSL Self-Signed Certificate↗
- SSL/TLS Diffie-Hellman Modulus <= 1024 Bits (Logjam)↗
- TLS Version 1.0 Protocol Detection↗
- TLS Version 1.1 Protocol Deprecated↗
- Apache 2.4.x < 2.4.58 Multiple Vulnerabilities↗
- Apache Log4j Vulnerabilities↗
- Apache Solr Unauthenticated Access Information Disclosure↗
- Apache Struts Vulnerabilities↗
- Apache Tomcat Vulnerabilities↗
- Amazon Corretto Java 11.x < 11.0.19.7.1 Multiple Vulnerabilities↗
- OpenJDK Vulnerabilities↗
- Oracle Java SE Vulnerabilities↗
- 7-Zip < 23.00 Multiple Vulnerabilities↗
- Adobe Acrobat Vulnerabilities↗
- AMQP Cleartext Authentication↗
- Artifex Ghostscript < 10.2.1 DoS↗
- Chargen UDP Service Remote DoS↗
- Curl 7.84 <= 8.2.1 Header DoS (CVE-2023-38039)↗
- Echo Service Detection↗
- HSTS Missing From HTTPS Server (RFC 6797)↗
- HTTP TRACE / TRACK Methods Allowed↗
- Insecure Windows Service Permissions↗
- Keepass < 2.54 Information disclosure↗
- Notepad++ < 8.5.7 Multiple Buffer Overflow Vulnerabilities↗
- Quote of the Day (QOTD) Service Detection↗
- VMware Tools 10.3.x / 11.x / 12.x < 12.3.5 Token Bypass↗
- X Server Detection↗
- Template -> Use this template for new vulnerabilities