First published: Mon Apr 01 2019(Updated: )
This vulnerability allows local attackers to escalate privileges on vulnerable installations of VMware Workstation. An attacker must first obtain the ability to execute low-privileged code on the target system in order to exploit this vulnerability. The specific flaw exists within the processing of data sent to UHCI endpoints. Crafted data sent to UHCI endpoints can trigger a memory access past the end of an allocated data structure. An attacker can leverage this vulnerability to escalate privileges and execute code in the context of the hypervisor.
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | ||
VMware Fusion Pro | >=10.0.0<10.1.6 | |
VMware Fusion Pro | >=11.0.0<11.0.3 | |
VMware Workstation | >=14.0.0<14.1.7 | |
VMware Workstation | >=15.0.0<15.0.4 | |
VMware ESXi | =6.0 | |
VMware ESXi | =6.0-600-201811001 | |
VMware ESXi | =6.0-600-201811401 | |
VMware ESXi | =6.5 | |
VMware ESXi | =6.5-650-201707101 | |
VMware ESXi | =6.5-650-201707102 | |
VMware ESXi | =6.5-650-201707103 | |
VMware ESXi | =6.5-650-201707201 | |
VMware ESXi | =6.5-650-201707202 | |
VMware ESXi | =6.5-650-201707203 | |
VMware ESXi | =6.5-650-201707204 | |
VMware ESXi | =6.5-650-201707205 | |
VMware ESXi | =6.5-650-201707206 | |
VMware ESXi | =6.5-650-201707207 | |
VMware ESXi | =6.5-650-201707208 | |
VMware ESXi | =6.5-650-201707209 | |
VMware ESXi | =6.5-650-201707210 | |
VMware ESXi | =6.5-650-201707211 | |
VMware ESXi | =6.5-650-201707212 | |
VMware ESXi | =6.5-650-201707213 | |
VMware ESXi | =6.5-650-201707214 | |
VMware ESXi | =6.5-650-201707215 | |
VMware ESXi | =6.5-650-201707216 | |
VMware ESXi | =6.5-650-201707217 | |
VMware ESXi | =6.5-650-201707218 | |
VMware ESXi | =6.5-650-201707219 | |
VMware ESXi | =6.5-650-201707220 | |
VMware ESXi | =6.5-650-201707221 | |
VMware ESXi | =6.5-650-201811001 | |
VMware ESXi | =6.5-650-201811301 | |
VMware ESXi | =6.7 | |
VMware ESXi | =6.7-670-201810101 | |
VMware ESXi | =6.7-670-201810102 | |
VMware ESXi | =6.7-670-201810103 | |
VMware ESXi | =6.7-670-201810201 | |
VMware ESXi | =6.7-670-201810202 | |
VMware ESXi | =6.7-670-201810203 | |
VMware ESXi | =6.7-670-201810204 | |
VMware ESXi | =6.7-670-201810205 | |
VMware ESXi | =6.7-670-201810206 | |
VMware ESXi | =6.7-670-201810207 | |
VMware ESXi | =6.7-670-201810208 | |
VMware ESXi | =6.7-670-201810209 | |
VMware ESXi | =6.7-670-201810210 | |
VMware ESXi | =6.7-670-201810211 | |
VMware ESXi | =6.7-670-201810212 | |
VMware ESXi | =6.7-670-201810213 | |
VMware ESXi | =6.7-670-201810214 | |
VMware ESXi | =6.7-670-201810215 | |
VMware ESXi | =6.7-670-201810216 | |
VMware ESXi | =6.7-670-201810217 | |
VMware ESXi | =6.7-670-201810218 | |
VMware ESXi | =6.7-670-201810219 | |
VMware ESXi | =6.7-670-201810220 | |
VMware ESXi | =6.7-670-201810221 | |
VMware ESXi | =6.7-670-201810222 | |
VMware ESXi | =6.7-670-201810223 | |
VMware ESXi | =6.7-670-201810224 | |
VMware ESXi | =6.7-670-201810225 | |
VMware ESXi | =6.7-670-201810226 | |
VMware ESXi | =6.7-670-201810227 | |
VMware ESXi | =6.7-670-201810228 | |
VMware ESXi | =6.7-670-201810229 | |
VMware ESXi | =6.7-670-201810230 | |
VMware ESXi | =6.7-670-201810231 | |
VMware ESXi | =6.7-670-201810232 | |
VMware ESXi | =6.7-670-201810233 | |
VMware ESXi | =6.7-670-201810234 | |
VMware ESXi | =6.7-670-201901401 | |
VMware ESXi | =6.7-670-201901402 | |
VMware ESXi | =6.7-670-201901403 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2019-5518 is classified as high due to its potential for privilege escalation.
To fix CVE-2019-5518, upgrade to the latest version of VMware Workstation or Fusion as recommended in the security advisory.
CVE-2019-5518 impacts certain versions of VMware Workstation and VMware Fusion, particularly those below specified release versions.
No, CVE-2019-5518 requires local access to execute low-privileged code on the affected system for exploitation.
The impact of CVE-2019-5518 is that it allows local attackers to escalate their privileges on affected VMware installations.