642
VMScore

CVE-2020-3947

Published: 16/03/2020 Updated: 20/03/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
CVSS v3 Base Score: 8.8 | Impact Score: 6 | Exploitability Score: 2
VMScore: 642
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

VMware Workstation (15.x prior to 15.5.2) and Fusion (11.x prior to 11.5.2) contain a use-after vulnerability in vmnetdhcp. Successful exploitation of this issue may lead to code execution on the host from the guest or may allow malicious users to create a denial-of-service condition of the vmnetdhcp service running on the host machine.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware fusion

vmware workstation

Github Repositories

VMware Exploitation A collection of links related to VMware escape exploits Pull requests are welcome Follow @andreyknvl on Twitter to be notified of updates Research 2020 "Detailing Two VMware Workstation TOCTOU Vulnerabilities" by Reno Robert [article] "SpeedPwning VMware Workstation: Failing at Pwn2Own, but doing it fast" by Corentin Bayet and Bruno P

Antctf-real_vmpwn writeup The topic introduced the cve-2020-3947 UAF vulnerability and the silently fixed variable uninitialized vulnerability in the old version through the magical modification of the vmware dhcp component This combination of vulnerabilities can cause real escape in lower versions (<1512), so the vulnerability is named real_vmpwn Source link:https:

Recent Articles

Virtual machines, real problems: VMware fixes bug trio including guest-to-host hole in Workstation, Fusion
The Register • Shaun Nichols in San Francisco • 17 Mar 2020

Finally, something that isn't coronavirus related [delete this – ed.]

VMware has released security patches for a trio of bugs in its desktop-class virtualization products. The most serious of the holes, CVE-2020-3947, is a vulnerability in VMware Workstation and Fusion that can be exploited by a miscreant or malware in a guest VM to gain code execution on the host box via the vmnetdhcp component. As you might imagine, this is particularly bad if you are relying on virtualization to isolate malware samples during research, for instance, or if you are running untrus...