VMware Workstation and Fusion are prone to multiple security vulnerabilities. An attacker can leverage these issues to execute arbitrary code in the context of the affected system, gain sensitive information and cause a denial of service condition. The following VMware products are affected: Workstation version 15.x Fusion version 11.x
Permit local access for trusted individuals only. Where possible, use restricted environments and restricted shells.
Ensure that only trusted users have local, interactive access to affected computers.
Run all software as a nonprivileged user with minimal access rights.
To reduce the impact of latent vulnerabilities, run all server processes with the minimal amount of privileges required for functionality.
Do not accept or execute files from untrusted or unknown sources.
To reduce the likelihood of successful exploits, never handle files that originate from unfamiliar or untrusted sources.
Updates are available. Please see the references or vendor advisory for more information.