First published: Tue Apr 09 2019(Updated: )
VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle paths appropriately. Successful exploitation of this issue may allow the path to the VMX executable, on a Windows host, to be hijacked by a non-administrator leading to elevation of privilege.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | >=14.0.0<14.1.6 | |
VMware Workstation | >=15.0.0<15.0.3 | |
Microsoft Windows | ||
All of | ||
Any of | ||
VMware Workstation | >=14.0.0<14.1.6 | |
VMware Workstation | >=15.0.0<15.0.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5511 is rated as a critical vulnerability due to its potential for elevation of privilege on Windows hosts.
To fix CVE-2019-5511, upgrade VMware Workstation to version 15.0.3 or later for 15.x and to version 14.1.6 or later for 14.x.
CVE-2019-5511 affects VMware Workstation versions 15.x before 15.0.3 and 14.x before 14.1.6 running on Windows.
CVE-2019-5511 exploits improper handling of paths, allowing non-administrators to hijack the path to the VMX executable.
CVE-2019-5511 was disclosed in 2019 and has been addressed in subsequent updates by VMware.