Security News > 2021 > June > VMware Patches Privilege Escalation Vulnerability in Tools for Windows
A high-severity vulnerability that VMware patched this week in VMware Tools for Windows could be exploited to execute arbitrary code with elevated privileges.
Tracked as CVE-2021-21999 and featuring a CVSS score of 7.8, the issue is a local privilege escalation that requires for an attacker to have normal access to a virtual machine for successful exploitation.
"An attacker with normal access to a virtual machine may exploit this issue by placing a malicious file renamed as 'openssl.cnf' in an unrestricted directory which would allow code to be executed with elevated privileges," VMware notes in an advisory.
The company also explains that this security hole is not limited to VMware Tools for Windows, impacting VMware Remote Console for Windows and VMware App Volumes as well.
VMware says the flaw was reported by Zeeshan Shaikh from NotSoSecure and Hou JingYi of Qihoo 360.
The vulnerability has been addressed with the release of VMware Tools for Windows 11.2.6, VMRC for Windows 12.0.1, and App Volumes 4 release 2103/App Volumes 2.18.10.
News URL
Related news
- VMware Releases vCenter Server Update to Fix Critical RCE Vulnerability (source)
- Researchers Uncover OS Downgrade Vulnerability Targeting Microsoft Windows Kernel (source)
- Patching problems: The “return” of a Windows Themes spoofing vulnerability (source)
- Top Vulnerability Management Tools: Reviews & Comparisons 2024 (source)
- Microsoft blames Windows Server 2025 automatic upgrades on 3rd-party tools (source)
Related Vulnerability
DATE | CVE | VULNERABILITY TITLE | RISK |
---|---|---|---|
2021-06-23 | CVE-2021-21999 | Uncontrolled Search Path Element vulnerability in VMWare APP Volumes, Remote Console and Tools VMware Tools for Windows (11.x.y prior to 11.2.6), VMware Remote Console for Windows (12.x prior to 12.0.1) , VMware App Volumes (2.x prior to 2.18.10 and 4 prior to 2103) contain a local privilege escalation vulnerability. | 7.8 |