7.2 High
CVSS2
Access Vector
LOCAL
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
COMPLETE
Integrity Impact
COMPLETE
Availability Impact
COMPLETE
AV:L/AC:L/Au:N/C:C/I:C/A:C
0.001 Low
EPSS
Percentile
25.7%
a. VMware VMCI privilege escalation
VMware ESX, Workstation, Fusion, and View contain a vulnerability in the handling of control code in vmci.sys. A local malicious user may exploit this vulnerability to manipulate the memory allocation through the Virtual Machine Communication Interface (VMCI) code. This could result in a privilege escalation on Windows-based hosts and on Windows-based Guest Operating Systems.
The vulnerability does not allow for privilege escalation from the Guest Operating System to the host (and vice versa). This means that host memory can not be manipulated from the Guest Operating System (and vice versa).
Systems that have VMCI disabled are also affected by this issue.
VMware would like to thank Derek Soeder of Cylance, Inc. and Kostya Kortchinsky of Microsoft for independently reporting this issue to us.
The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the names CVE-2013-1406 to this issue.
Column 4 of the following table lists the action required to remediate the vulnerability in each release, if a solution is available.
CPE | Name | Operator | Version |
---|---|---|---|
workstation | lt | 9.0.1 | |
workstation | lt | 8.0.5 | |
fusion | lt | 5.0.2 | |
fusion | lt | 4.1.4 | |
view | lt | 5.1.2 | |
view | lt | 4.6.2 | |
esxi | lt | ESXi510-201212102-SG | |
esxi | lt | ESXi500-201212102-SG | |
esxi | lt | ESXi410-201211402-BG | |
esxi | lt | ESXi400-201302402-SG |