VMware informed customers on Tuesday that it addressed a total of 10 vulnerabilities affecting its ESXi, Workstation and Fusion products, including critical and high-severity flaws that can be exploited for code execution on the hypervisor.
The most serious of the vulnerabilities is CVE-2020-3962, a critical use-after-free bug related to the SVGA device. An attacker who has local access to a virtual machine (VM) with 3D graphics enabled can exploit the weakness for arbitrary code execution on the hypervisor from the VM.
VMware has pointed out that 3D graphics are enabled by default on Workstation and Fusion, but not on ESXi.
A very similar vulnerability patched this week by the virtualization giant is an off-by-one heap overflow bug related to the SVGA device. Exploitation of this vulnerability requires the same types of permissions and it can also result in code execution, but it has been rated high severity instead of critical due to the attack complexity being assigned as high — the attack complexity is considered low for the previous flaw.
“Additional conditions beyond the attacker’s control must be present for exploitation to be possible,” VMware said in its advisory.
Another high-severity vulnerability affecting ESXi, Workstation and Fusion has been described as a heap overflow affecting the USB 2.0 controller. Similar to the aforementioned security holes, this one also allows an attacker with local access to a VM to execute arbitrary code on the hypervisor.
The same USB 2.0 controller is impacted by a race condition that causes a heap overflow. This bug can also allow arbitrary code execution on the hypervisor, but exploitation is only possible against certain configurations.
A high-severity vulnerability identified in the USB 3.0 controller allows an attacker with admin privileges on the VM to cause a denial-of-service (DoS) condition or execute arbitrary code on the hypervisor. Another high-severity issue affecting this controller can be leveraged by a local attacker to read privileged information from memory.
Other flaws patched by the company have been rated medium severity and they can be exploited by local attackers to cause a DoS condition or to read privileged information from memory.
Many of the vulnerabilities were reported to VMware by various researchers through Trend Micro’s Zero Day Initiative, and several were identified by a researcher from Google. The same Google employee was credited recently by VMware for a high-severity information disclosure flaw affecting Workstation, Fusion and vSphere.
Related: Details Released for Flaw Allowing Full Control Over VMware Deployments
Related: Hackers Can Compromise VMware vCenter Server Via Newly Patched Flaw
Related: Remote Code Execution Vulnerability Patched in VMware Cloud Director

Eduard Kovacs (@EduardKovacs) is a contributing editor at SecurityWeek. He worked as a high school IT teacher for two years before starting a career in journalism as Softpedia’s security news reporter. Eduard holds a bachelor’s degree in industrial informatics and a master’s degree in computer techniques applied in electrical engineering.
More from Eduard Kovacs
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Hive Ransomware Operation Shut Down by Law Enforcement
- UK Gov Warns of Phishing Attacks Launched by Iranian, Russian Cyberspies
- Dozens of Cybersecurity Companies Announced Layoffs in Past Year
- Security Update for Chrome 109 Patches 6 Vulnerabilities
- New Open Source OT Security Tool Helps Address Impact of Upcoming Microsoft Patch
- Forward Networks Raises $50 Million in Series D Funding
Latest News
- Critical Vulnerability Impacts Over 120 Lexmark Printers
- BIND Updates Patch High-Severity, Remotely Exploitable DoS Flaws
- Industry Reactions to Hive Ransomware Takedown: Feedback Friday
- Microsoft Urges Customers to Patch Exchange Servers
- Iranian APT Leaks Data From Saudi Arabia Government Under New Persona
- US Reiterates $10 Million Reward Offer After Disruption of Hive Ransomware
- Cyberattacks Target Websites of German Airports, Admin
- US Infiltrates Big Ransomware Gang: ‘We Hacked the Hackers’
