vmware tools CVE-2023-20867 in VMware and Canonical Products
Published on June 13, 2023

product logo product logo
A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.

Vendor Advisory NVD

Known Exploited Vulnerability

This VMware Tools Authentication Bypass Vulnerability is part of CISA's list of Known Exploited Vulnerabilities. VMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.

The following remediation steps are recommended / required by July 14, 2023: Apply updates per vendor instructions.

Vulnerability Analysis

CVE-2023-20867 can be exploited with local system access, and requires user privileges. This vulnerability is consided to have a high level of attack complexity. It has an exploitability score of 0.8 out of four. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.

What is an authentification Vulnerability?

When an actor claims to have a given identity, the software does not prove or insufficiently proves that the claim is correct.

CVE-2023-20867 has been classified to as an authentification vulnerability or weakness.


Products Associated with CVE-2023-20867

You can be notified by stack.watch whenever vulnerabilities like CVE-2023-20867 are published in these products:

 
 

What versions are vulnerable to CVE-2023-20867?