CVE-2020-3950
Published on March 17, 2020

VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.

Vendor Advisory NVD

Known Exploited Vulnerability

This VMware Privilege escalation vulnerability is part of CISA's list of Known Exploited Vulnerabilities. Privilege escalation vulnerability due to improper use of setuid binaries.

The following remediation steps are recommended / required by May 3, 2022: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2020-3950 is exploitable with local system access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. It has an exploitability score of 1.8 out of four. The potential impact of an exploit of this vulnerability is considered to be very high.

Improper Privilege Management

The software does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.


Products Associated with CVE-2020-3950

You can be notified by stack.watch whenever vulnerabilities like CVE-2020-3950 are published in these products:

What versions are vulnerable to CVE-2020-3950?

Each of the following must match for the vulnerability to exist.