8.8
CVSSv3

CVE-2019-5512

Published: 09/04/2019 Updated: 24/08/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

VMware Workstation (15.x prior to 15.0.3, 14.x prior to 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware workstation

Exploits

VMware: Host VMX Process COM Class Hijack EoP Platform: VMware Workstation Windows v1415 (on Windows 10) Also tested VMware Player 15 Class: Elevation of Privilege Summary: COM classes used by the VMX process on a Windows host can be hijacked leading to elevation of privilege Description: The VMX process (vmware-vmxexe) process configures a ...