VMware Tools security bypass | CVE-2023-20867
NAME
__________
VMware Tools security bypass
Platforms Affected:
VMware Tools 11
VMware Tools 12
VMware Tools 10.3
Risk Level:
3.9
Exploitability:
Unproven
Consequences:
Bypass Security
DESCRIPTION
__________
VMware Tools could allow a local authenticated attacker to bypass security restrictions, caused by the failure to authenticate host-to-guest operations in the vgauth module. An attacker could exploit this vulnerability using a fully compromised ESXi host to bypass authentication and obtain access to the guest virtual machine.
CVSS 3.0 Information
__________
Privileges Required:
High
User Interaction:
None
Scope:
Changed
Access Vector:
Local
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
![VMware Tools security bypass | CVE-2023-20867 1 Buy Me A Coffee](https://www.redpacketsecurity.com/wp-content/uploads/2022/10/buymeacoffee.png)
![VMware Tools security bypass | CVE-2023-20867 2 Patreon](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.