Connect with us

Hi, what are you looking for?

SecurityWeekSecurityWeek

Vulnerabilities

VMware Fixes Fusion Vulnerability Introduced by Previous Patch

An update released last week by VMware for the macOS version of Fusion attempts to fix a serious privilege escalation vulnerability introduced by a previous patch.

An update released last week by VMware for the macOS version of Fusion attempts to fix a serious privilege escalation vulnerability introduced by a previous patch.

VMware informed customers in mid-March that it had patched a high-severity privilege escalation vulnerability in Fusion, Remote Console (VMRC) and Horizon Client for Mac. The flaw, tracked as CVE-2020-3950, can be exploited by an attacker with regular user privileges to escalate privileges to root.

The researchers who independently reported the issue to VMware, Rich Mirch and Jeffball, immediately noted that the patch was incomplete. VMware confirmed that the patch was incomplete a few days later.

Roughly one week after the initial patch was released, VMware made another attempt at fixing the vulnerability, but this second fix introduced a new vulnerability.

This new flaw, tracked as CVE-2020-3957, is described as a time-of-check time-of-use (TOCTOU) bug that still makes it possible for an attacker with low permissions to execute arbitrary code with root privileges.

VMware attempted to patch the TOCTOU vulnerability in Fusion last week with the release of version 11.5.5, but patches for VMRC and Horizon Client for Mac are pending.

Advertisement. Scroll to continue reading.

Mirch, who plans on publishing a blog post and a new proof-of-concept (PoC) exploit for the vulnerability in the upcoming days, told SecurityWeek that his initial tests showed that the patch works. He says he has yet to perform a full assessment.

In addition to this vulnerability, VMware informed customers last week that it has released updates for ESXi, Workstation and Fusion to address a couple of medium-severity denial-of-service (DoS) vulnerabilities.

Related: Details Released for Flaw Allowing Full Control Over VMware Deployments

Related: Hackers Can Compromise VMware vCenter Server Via Newly Patched Flaw

Related: Remote Code Execution Vulnerability Patched in VMware Cloud Director

Written By

Eduard Kovacs (@EduardKovacs) is senior managing editor at SecurityWeek. He worked as a high school IT teacher before starting a career in journalism in 2011. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.

Click to comment

Trending

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest threats, trends, and technology, along with insightful columns from industry experts.

Organizations are investing heavily in third-party risk management, but breaches, delays, and blind spots continue to persist. Join this live webinar as we examine the gap between how organizations think their third-party risk programs are performing and what’s actually happening in practice.

Register

Delve into big-picture strategies to reduce attack surfaces, improve patch management, conduct post-incident forensics, and tools and tricks needed in a modern organization.

Register

People on the Move

Silvio Pappalardo has joined AuthMind as Chief Revenue Officer.

iCOUNTER has appointed Lisa Hayashi as CMO and Bob Kalchthaler as CFO.

Thomas Bain has been appointed Chief Marketing Officer at Silent Push.

More People On The Move

Expert Insights

Daily Briefing Newsletter

Subscribe to the SecurityWeek Email Briefing to stay informed on the latest cybersecurity news, threats, and expert insights. Unsubscribe at any time.