PoC Exploit Launches for VMware Workstation Guest-to-Host Escape Flaw

Try Our Free Tools!
Master the web with Free Tools that work as hard as you do. From Text Analysis to Website Management, we empower your digital journey with expert guidance and free, powerful tools.

A PoC Exploit Unveiled for VMware Workstation Vulnerability

A critical vulnerability chain in VMware Workstation has been exposed through a proof-of-concept (PoC) exploit, enabling malicious actors to breach a guest virtual machine and execute arbitrary code on the host operating system.

This exploit adeptly connects an information leak with a stack-based buffer overflow, culminating in a complete guest-to-host escape—an exceptionally severe category of security flaw prevalent within virtualization platforms.

Originally highlighted at the Pwn2Own Vancouver event in 2023, the exploit has been documented by security researcher Alexander Zaviyalov of NCC Group, who recently released an extensive technical analysis alongside a functional PoC, illustrating the tangible threat posed by these vulnerabilities.

The Two-Stage Attack

The formidable guest-to-host escape is executed by encompassing two disparate vulnerabilities associated with the virtual Bluetooth device feature in VMware Workstation—an option that is activated by default, thereby allowing a guest VM to utilize the host’s Bluetooth adapter.

Information Leak (CVE-2023-20870, CVE-2023-34044): The initial segment of the attack capitalizes on a Use-After-Free (UAF) memory leak. By dispatching specifically formulated USB Request Block (URB) control transfers to the virtual mouse and Bluetooth devices, an adversary can extract memory pointers from the vmware-vmx.exe process running on the host.

This memory leak proves vital for circumventing Address Space Layout Randomization (ASLR), a standard security measure that randomizes memory addresses to complicate the exploitation process.

Buffer Overflow (CVE-2023-20869): Once ASLR is bypassed, the perpetrator progresses to the subsequent phase, which involves initiating a stack-based buffer overflow by transmitting a malicious Service Discovery Protocol (SDP) packet from the guest VM to another Bluetooth device detectable by the host.

The overflow facilitates the hijacking of the program’s execution flow, enabling the attacker to employ the leaked memory addresses to execute a personalized payload on the host environment.

The synergy of these vulnerabilities permits an assailant with command over a guest VM to seize complete control of the host machine.

In a practical demonstration, the exploit successfully initiated a reverse shell from a Linux guest to a fully patched Windows 11 host, effectively compromising the foundational system, as stated by Alexander Zaviyalov here.

This comprehensive exploit chain predominantly impacts VMware Workstation 17.0.1 and earlier iterations. The respective vulnerabilities have distinct patch timelines:

  • The stack-based buffer overflow (CVE-2023-20869) was rectified in version 17.0.2.
  • The memory leak vulnerabilities (CVE-2023-20870 and CVE-2023-34044) have been patched in versions 17.0.2 and 17.5.0, respectively.

Given that the full exploit necessitates both the buffer overflow and the memory leak, users operating version 17.0.1 or older are at heightened risk.

Mitigations

PoC Exploit Launches for VMware Workstation Guest-to-Host Escape Flaw

The foremost directive for all users is to upgrade their VMware Workstation software to the latest version available (17.5.0 or more recent), which encompasses remedies for all identified vulnerabilities.

For those unable to execute an immediate update, a potential workaround involves disabling the virtual Bluetooth device. This can be achieved by deselecting the “Share Bluetooth devices with the virtual machine” option within the USB Controller settings of the virtual machine.

Disabling this feature effectively eliminates the attack surface leveraged by this specific PoC. The comprehensive research underscores the intricate nature of contemporary exploits and accentuates the necessity of prompt patching in virtualization platforms.

Source link: Cybersecuritynews.com.

Disclosure: This article is for general information only and is based on publicly available sources. We aim for accuracy but can't guarantee it. The views expressed are the author's and may not reflect those of the publication. Some content was created with help from AI and reviewed by a human for clarity and accuracy. We value transparency and encourage readers to verify important details. This article may include affiliate links. If you buy something through them, we may earn a small commission — at no extra cost to you. All information is carefully selected and reviewed to ensure it's helpful and trustworthy.

Reported By

RS Web Solutions

We provide the best tutorials, reviews, and recommendations on all technology and open-source web-related topics. Surf our site to extend your knowledge base on the latest web trends.
Share the Love
Related News Worth Reading