Published: 17/03/2020 Updated: 03/04/2020
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

VMware Fusion (11.x prior to 11.5.2), VMware Remote Console for Mac (11.x and prior prior to 11.0.1) and Horizon Client for Mac (5.x and prior prior to 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.

Vulnerability Trend

Affected Products

Vendor Product Versions
VmwareFusion11.0.0, 11.0.1, 11.0.2, 11.0.3, 11.1.0, 11.1.1, 11.5.0, 11.5.1
VmwareHorizon Client5.0.0, 5.1.0, 5.2.0, 5.3.0
VmwareRemote Console11.0.0


# Exploit Title: VMware Fusion 1152 - Privilege Escalation # Date: 2020-03-17 # Exploit Author: Rich Mirch # Vendor Homepage: wwwvmwarecom/products/fusionhtml # Vendor Advisory: wwwvmwarecom/security/advisories/VMSA-2020-0005html # Software Link: download3vmwarecom/software/fusion/file/VMware-Fusion-1151-15018442 ...

Mailing Lists

VMware Fusion version 1152 suffers from a privilege escalation vulnerability ...

Recent Articles

VMware Fixes High Severity Privilege Escalation Bug in Fusion
BleepingComputer • Sergiu Gatlan • 17 Mar 2020

VMware today released security updates to address high severity privilege escalation and denial-of-service (DoS) in the VMware Workstation, Fusion, VMware Remote Console and Horizon Client.
The two security flaws currently tracked as CVE-2020-3950 and CVE-2020-3951 are due to the improper use of setuid binaries and a heap-overflow issue in Cortado Thinprint.
CVE-2020-3950 reported by Jeffball of GRIMM and Rich Mirch was rated by VMware with a CVSSv3 base score of 7.3 and it was...