VMware Again Fails to Patch Privilege Escalation Vulnerability in Fusion

VMware has released an update for the macOS version of Fusion to fix a privilege escalation vulnerability for which it initially released an incomplete patch. However, one of the researchers who found it says the patch is “still bad.”


VMware told customers on March 17 that Fusion, Remote Console (VMRC) and Horizon Client for Mac are impacted by a high-severity privilege escalation vulnerability tracked as CVE-2020-3950. The weakness, related to the improper use of setuid binaries, allows an attacker with regular user privileges to escalate permissions to root.


The company released version 11.5.2 to patch the vulnerability, but the researchers credited for reporting the vulnerability to VMware — Jeffball from cybersecurity firm GRIMM and Rich Mirch — both found that the patch was incomplete.


The researchers made available technical details and proof-of-concept (PoC) exploit code after VMware released the initial patches.


Mirch provided the following description for the vulnerability: VMware USB Arbitrator Service and Open VMware Fusion Services are both setuid root binaries located at /Applications/VMware Fusion.app/Contents/Library/services. When executed outside of the standard path the binaries can be tricked into executing a program from a path that the attacker controls. This is achieved by creating a hard link to the original binary. The binaries use part of the attacker-controlled path when executing the service and do not correctly validate that the target binary is legit.


After it was informed about the incomplete patch, VMware updated its advisory with instructions for preventing exploitation and promised to release a complete patch in the next Fusion release.


VMware has now released 11.5.3, which the company ..

Support the originator by clicking the read the rest link below.