VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html | Exploit Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2020-0005.html | Vendor Advisory |
https://www.vmware.com/security/advisories/VMSA-2020-0005.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
AND |
|
History
29 Jan 2025, 18:15
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vmware.com/security/advisories/VMSA-2020-0005.html - Vendor Advisory | |
References | () http://packetstormsecurity.com/files/156843/VMware-Fusion-11.5.2-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry | |
References | () http://packetstormsecurity.com/files/157079/VMware-Fusion-USB-Arbitrator-Setuid-Privilege-Escalation.html - Exploit, Third Party Advisory, VDB Entry |
Information
Published : 2020-03-17 19:15
Updated : 2025-03-13 17:28
NVD link : CVE-2020-3950
Mitre link : CVE-2020-3950
JSON object : View
Products Affected
vmware
- fusion
- horizon_client
- remote_console
apple
- macos
CWE
CWE-269
Improper Privilege Management