Security News > 2021 > June > VMware Patches Privilege Escalation Vulnerability in Tools for Windows

VMware Patches Privilege Escalation Vulnerability in Tools for Windows
2021-06-23 11:18

A high-severity vulnerability that VMware patched this week in VMware Tools for Windows could be exploited to execute arbitrary code with elevated privileges.

Tracked as CVE-2021-21999 and featuring a CVSS score of 7.8, the issue is a local privilege escalation that requires for an attacker to have normal access to a virtual machine for successful exploitation.

"An attacker with normal access to a virtual machine may exploit this issue by placing a malicious file renamed as 'openssl.cnf' in an unrestricted directory which would allow code to be executed with elevated privileges," VMware notes in an advisory.

The company also explains that this security hole is not limited to VMware Tools for Windows, impacting VMware Remote Console for Windows and VMware App Volumes as well.

VMware says the flaw was reported by Zeeshan Shaikh from NotSoSecure and Hou JingYi of Qihoo 360.

The vulnerability has been addressed with the release of VMware Tools for Windows 11.2.6, VMRC for Windows 12.0.1, and App Volumes 4 release 2103/App Volumes 2.18.10.


News URL

http://feedproxy.google.com/~r/securityweek/~3/hgglBqRJ4Do/vmware-patches-privilege-escalation-vulnerability-tools-windows

Related Vulnerability

DATE CVE VULNERABILITY TITLE RISK
2021-06-23 CVE-2021-21999 Uncontrolled Search Path Element vulnerability in VMWare APP Volumes, Remote Console and Tools
VMware Tools for Windows (11.x.y prior to 11.2.6), VMware Remote Console for Windows (12.x prior to 12.0.1) , VMware App Volumes (2.x prior to 2.18.10 and 4 prior to 2103) contain a local privilege escalation vulnerability.
local
low complexity
vmware CWE-427
7.8

Related vendor

VENDOR LAST 12M #/PRODUCTS LOW MEDIUM HIGH CRITICAL TOTAL VULNS
Vmware 146 11 222 256 102 591