Lucene search

K
kasperskyKaspersky LabKLA11164
HistoryDec 19, 2017 - 12:00 a.m.

KLA11164 Multiple vulnerabilities in VMware products

2017-12-1900:00:00
Kaspersky Lab
threats.kaspersky.com
39

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.15 Low

EPSS

Percentile

95.8%

Multiple serious vulnerabilities have been found in VMware products. Malicious users can exploit these vulnerabilities to cause privelege escalation, cross site scripting and arbitrary code execution.

  1. A vulnerability, related with using VNC can be exploited remotely via sending specipic VNC packets to execute arbitrary code;
  2. A vulnerability in ESXi Host Client component can be exploited remotely to perform cross site scripting;
  3. A vulnerability in VMware vCenter Server Appliance can be exploited remotely gain privileges.

Technical details

Vulnerability (1) is affected VMvare Workstation, VMvare Fusion and VMvare ESXi products

Vulnerability (3) is affected VMware ESXi

Vulnerability (3) is affected VMware vCenter Server Appliance

NB: This vulnerability does not have any public CVSS rating, so rating can be changed by the time.

Original advisories

VMSA-2017-0015.2

Related products

VMware-Workstation

VMware-Fusion

VMware-vCenter-Server

CVE list

CVE-2017-4933 high

CVE-2017-4940 warning

CVE-2017-4941 high

CVE-2017-4943 high

Solution

Update to latest versionsDownload VMware Workstation ProDownload VMware vCenter Server

Download VMware Fusion

Impacts

  • ACE

Arbitrary code execution. Exploitation of vulnerabilities with this impact can lead to executing by abuser any code or commands at vulnerable machine or process.

  • SB

Security bypass. Exploitation of vulnerabilities with this impact can lead to performing actions restricted by current security settings.

  • PE

Privilege escalation. Exploitation of vulnerabilities with this impact can lead to performing by abuser actions, which are normally disallowed for current role.

Affected Products

  • Workstation versions earlier than 12.5.8Fusion 8 versions earlier than 8.5.9vCenterΒ Server Appliance version 6.5 without patch 6.5 U1

7.2 High

CVSS2

Attack Vector

LOCAL

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:L/AC:L/Au:N/C:C/I:C/A:C

8.8 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

8.6 High

AI Score

Confidence

High

0.15 Low

EPSS

Percentile

95.8%