This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Vmware First view 2014-08-28
Product Tools Last view 2023-10-27
Version Type
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:vmware:tools:*:*:*:*:*:*:*:* 20
cpe:2.3:a:vmware:tools:8.0.2.17586:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.0:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.10559:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.12031:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.12548:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.14166:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.14664:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.15040:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.1.2.20911:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.1.12458:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.2.14744:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.2.16474:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:-:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.3.17828:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.3.19531:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.3.21653:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.0.4.24748:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.3.2.1593:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.3.7.3827:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.3.7.4937:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.3.12.8191:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:8.4.6.16648:*:*:*:freebsd:*:*:* 18
cpe:2.3:a:vmware:tools:8.4.6.16648:*:*:*:linux:*:*:* 18
cpe:2.3:a:vmware:tools:8.4.6.16648:*:*:*:netware:*:*:* 18
cpe:2.3:a:vmware:tools:*:*:*:*:windows:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.16:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:10.0.5:*:~~~windows~~:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:10.0.0:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:10.0.5:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:10.0.6:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:10.0.8:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.1:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.5:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.10:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.11:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.12:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.13:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.15:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:3.0.0:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.0.17:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.4.0:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.4.5:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.4.10:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.4.11:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.4.12:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.4.15:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.10.0:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.10.1:*:*:*:*:*:*:* 18
cpe:2.3:a:vmware:tools:9.10.5:*:*:*:*:*:*:* 18

Related : CVE

  Date Alert Description
7.8 2023-10-27 CVE-2023-34057

VMware Tools contains a local privilege escalation vulnerability. A malicious actor with local user access to a guest virtual machine may elevate privileges within the virtual machine.

7.5 2023-08-31 CVE-2023-20900

A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html  in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .

3.9 2023-06-13 CVE-2023-20867

A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.

5.5 2023-06-07 CVE-2022-31693

VMware Tools for Windows (12.x.y prior to 12.1.5, 11.x.y and 10.x.y) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest OS, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest OS.

6.5 2022-11-29 CVE-2021-31693

The 10Web Photo Gallery plugin through 1.5.68 for WordPress allows XSS via album_gallery_id_0, bwg_album_search_0, and type_0 for bwg_frontend_data. NOTE: other parameters are covered by CVE-2021-24291, CVE-2021-25041, and CVE-2021-46889. NOTE: VMware information, previously connected to this CVE ID because of a typo, is at CVE-2022-31693.

7.8 2022-08-23 CVE-2022-31676

VMware Tools (12.0.0, 11.x.y and 10.x.y) contains a local privilege escalation vulnerability. A malicious actor with local non-administrative access to the Guest OS can escalate privileges as a root user in the virtual machine.

7.1 2022-05-24 CVE-2022-22977

VMware Tools for Windows(12.0.0, 11.x.y and 10.x.y) contains an XML External Entity (XXE) vulnerability. A malicious actor with non-administrative local user privileges in the Windows guest OS, where VMware Tools is installed, may exploit this issue leading to a denial-of-service condition or unintended information disclosure.

6.7 2022-03-03 CVE-2022-22943

VMware Tools for Windows (11.x.y and 10.x.y prior to 12.0.0) contains an uncontrolled search path vulnerability. A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.

7.8 2021-06-23 CVE-2021-21999

VMware Tools for Windows (11.x.y prior to 11.2.6), VMware Remote Console for Windows (12.x prior to 12.0.1) , VMware App Volumes (2.x prior to 2.18.10 and 4 prior to 2103) contain a local privilege escalation vulnerability. An attacker with normal access to a virtual machine may exploit this issue by placing a malicious file renamed as `openssl.cnf' in an unrestricted directory which would allow code to be executed with elevated privileges.

5.5 2021-06-18 CVE-2021-21997

VMware Tools for Windows (11.x.y prior to 11.3.0) contains a denial-of-service vulnerability in the VM3DMP driver. A malicious actor with local user privileges in the Windows guest operating system, where VMware Tools is installed, can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest operating system.

3.3 2020-06-19 CVE-2020-3972

VMware Tools for macOS (11.x.x and prior before 11.1.1) contains a denial-of-service vulnerability in the Host-Guest File System (HGFS) implementation. Successful exploitation of this issue may allow attackers with non-admin privileges on guest macOS virtual machines to create a denial-of-service condition on their own VMs.

7 2020-01-15 CVE-2020-3941

The repair operation of VMware Tools for Windows 10.x.y has a race condition which may allow for privilege escalation in the Virtual Machine where Tools is installed. This vulnerability is not present in VMware Tools 11.x.y since the affected functionality is not present in VMware Tools 11.

7.1 2019-06-06 CVE-2019-5522

VMware Tools for Windows update addresses an out of bounds read vulnerability in vm3dmp driver which is installed with vmtools in Windows guest machines. This issue is present in versions 10.2.x and 10.3.x prior to 10.3.10. A local attacker with non-administrative access to a Windows guest with VMware Tools installed may be able to leak kernel information or create a denial of service attack on the same Windows guest machine.

7 2018-07-13 CVE-2018-6969

VMware Tools (10.x and prior before 10.3.0) contains an out-of-bounds read vulnerability in HGFS. Successful exploitation of this issue may lead to information disclosure or may allow attackers to escalate their privileges on the guest VMs. In order to be able to exploit this issue, file sharing must be enabled.

6.7 2017-07-28 CVE-2015-5191

VMware Tools prior to 10.0.9 contains multiple file system races in libDeployPkg, related to the use of hard-coded paths under /tmp. Successful exploitation of this issue may result in a local privilege escalation. CVSS:3.0/AV:L/AC:H/PR:L/UI:R/S:U/C:H/I:H/A:H

7.8 2016-12-29 CVE-2016-7080

The graphic acceleration functions in VMware Tools 9.x and 10.x before 10.0.9 on OS X allow local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2016-7079.

7.8 2016-12-29 CVE-2016-7079

The graphic acceleration functions in VMware Tools 9.x and 10.x before 10.0.9 on OS X allow local users to gain privileges or cause a denial of service (NULL pointer dereference) via unspecified vectors, a different vulnerability than CVE-2016-7080.

5.5 2016-12-29 CVE-2016-5328

VMware Tools 9.x and 10.x before 10.1.0 on OS X, when System Integrity Protection (SIP) is enabled, allows local users to determine kernel memory addresses and bypass the kASLR protection mechanism via unspecified vectors.

4.7 2014-08-28 CVE-2014-4200

vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, uses 0644 permissions for the vm-support archive, which allows local users to obtain sensitive information by extracting files from this archive.

6.3 2014-08-28 CVE-2014-4199

vm-support 0.88 in VMware Tools, as distributed with VMware Workstation through 10.0.3 and other products, allows local users to write to arbitrary files via a symlink attack on a file in /tmp.

CWE : Common Weakness Enumeration

%idName
11% (2) CWE-476 NULL Pointer Dereference
11% (2) CWE-427 Uncontrolled Search Path Element
11% (2) CWE-362 Race Condition
11% (2) CWE-269 Improper Privilege Management
11% (2) CWE-125 Out-of-bounds Read
5% (1) CWE-611 Information Leak Through XML External Entity File Disclosure
5% (1) CWE-294 Authentication Bypass by Capture-replay
5% (1) CWE-287 Improper Authentication
5% (1) CWE-264 Permissions, Privileges, and Access Controls
5% (1) CWE-254 Security Features
5% (1) CWE-200 Information Exposure
5% (1) CWE-59 Improper Link Resolution Before File Access ('Link Following')

Nessus® Vulnerability Scanner

id Description
2017-08-04 Name: The remote Fedora host is missing a security update.
File: fedora_2017-4b4154d6f6.nasl - Type: ACT_GATHER_INFO
2017-07-27 Name: The remote Fedora host is missing a security update.
File: fedora_2017-08ec8b6dc4.nasl - Type: ACT_GATHER_INFO
2017-03-28 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-385.nasl - Type: ACT_GATHER_INFO
2017-03-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0701-1.nasl - Type: ACT_GATHER_INFO
2017-03-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0702-1.nasl - Type: ACT_GATHER_INFO
2017-03-16 Name: The remote SUSE host is missing one or more security updates.
File: suse_SU-2017-0705-1.nasl - Type: ACT_GATHER_INFO
2017-02-21 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2017-276.nasl - Type: ACT_GATHER_INFO
2016-10-27 Name: A virtualization application installed on the remote macOS or Mac OS X host i...
File: macosx_vmware_tools_vmsa_2016_0017.nasl - Type: ACT_GATHER_INFO
2016-09-15 Name: A virtualization application installed on the remote Mac OS X host is affecte...
File: macosx_fusion_vmsa_2016_0014.nasl - Type: ACT_GATHER_INFO
2016-09-15 Name: A virtualization application installed on the remote Mac OS X host is affecte...
File: macosx_vmware_tools_vmsa_2016_0014.nasl - Type: ACT_GATHER_INFO
2016-09-15 Name: The remote VMware ESXi host is missing a security-related patch.
File: vmware_VMSA-2016-0014.nasl - Type: ACT_GATHER_INFO