|CERT-In Vulnerability Note
Multiple Vulnerabilities in VMware Products
Original Issue Date:December 29, 2017
Severity Rating: HIGH
- VMware Workstation versions 14.x, 12.x
- VMWare ESXi versions 5.5, 6.0, 6.5
- VMware Fusion versions 8.x, 10.x
- VMware vCSA versions 5.5, 6.0, 6.5
Multiple vulnerabilities have been reported in VMware products which could be exploited by an attacker to execute arbitrary code, conduct cross site scripting (XSS) attacks, or gain elevated privileges on the affected system.
1. Remote Code Execution Vulnerabilities
These vulnerabilities exist in multiple VMware products due to improper handling of stack and heap memory operations performed by the affected software. A remote attacker could exploit this vulnerability by running specially crafted VNC packets to take control over the affected system.
Successful exploitation of this vulnerability could allow the attacker to execute arbitrary code in the context of authenticated VNC session and result in compromising the system completely.
Note: Successful exploitation of this vulnerability in ESXi, if VNC is enabled in a virtual machines .vmx configuration file. In addition, ESXi must be configured to allow VNC traffic through the built-in firewall.
2. Cross Site Scripting Vulnerability
Successful exploitation could allow the attacker to conduct Cross Site Scripting (XSS) attacks on the target system.
3. Privilege escalation vulnerability
This vulnerability exists in VMware vCenter Server Appliance (vCSA) where a local attacker could gain root privileges on the target system via a "showlog" plugin.
Successful exploitation could allow the attacker to gain elevated privileges on the targeted system.
Apply appropriate fixes as issued by vendor in
The information provided herein is on "as is" basis, without warranty of any kind.
Email: email@example.com Phone: +91-11-24368572
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
6, CGO Complex, Lodhi Road,
New Delhi - 110 003