First published: Tue Apr 09 2019(Updated: )
VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | >=14.0.0<14.1.6 | |
VMware Workstation | >=15.0.0<15.0.3 | |
Microsoft Windows | ||
All of | ||
Any of | ||
VMware Workstation | >=14.0.0<14.1.6 | |
VMware Workstation | >=15.0.0<15.0.3 | |
Microsoft Windows |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2019-5512 has a medium severity rating due to its potential for privilege escalation.
To fix CVE-2019-5512, update VMware Workstation to version 15.0.3 or later, or 14.1.6 or later.
CVE-2019-5512 affects VMware Workstation versions 15.x prior to 15.0.3 and 14.x prior to 14.1.6 running on Windows.
CVE-2019-5512 cannot be exploited remotely; it requires local access to the vulnerable machine.
The exploitation of CVE-2019-5512 may lead to unauthorized elevation of privileges on the affected Windows host.