First published: Thu Aug 31 2023(Updated: )
VMware Tools could allow a remote attacker to bypass security restrictions, caused by improper SAML token signature verification. By utilize man-in-the-middle attack techniques, an attacker could exploit this vulnerability to perform VMware Tools Guest Operations
Credit: security@vmware.com security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
debian/open-vm-tools | <=2:12.2.5-1<=2:12.2.0-1<=2:11.2.5-2 | 2:12.3.0-1 2:12.2.0-1+deb12u1 2:11.2.5-2+deb11u2 |
VMware Tools | >=10.3.0<12.3.0 | |
Microsoft Windows | ||
VMware Tools | >=10.3.0<10.3.26 | |
Linux Linux kernel | ||
Vmware Open Vm Tools | >=10.3.0<12.3.0 | |
IBM QRadar SIEM | <=7.5 - 7.5.0 UP7 | |
All of | ||
VMware Tools | >=10.3.0<12.3.0 | |
Microsoft Windows | ||
All of | ||
VMware Tools | >=10.3.0<10.3.26 | |
Linux Linux kernel | ||
All of | ||
Vmware Open Vm Tools | >=10.3.0<12.3.0 | |
Linux Linux kernel | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
NetApp ONTAP Select Deploy administration utility | ||
ubuntu/open-vm-tools | <2:11.0.5-4ubuntu0.18.04.3+ | 2:11.0.5-4ubuntu0.18.04.3+ |
ubuntu/open-vm-tools | <12.3.0 | 12.3.0 |
ubuntu/open-vm-tools | <2:11.3.0-2ubuntu0~ubuntu20.04.6 | 2:11.3.0-2ubuntu0~ubuntu20.04.6 |
ubuntu/open-vm-tools | <2:12.1.5-3~ubuntu0.22.04.3 | 2:12.1.5-3~ubuntu0.22.04.3 |
ubuntu/open-vm-tools | <2:12.1.5-3ubuntu0.23.04.2 | 2:12.1.5-3ubuntu0.23.04.2 |
ubuntu/open-vm-tools | <2:10.2.0-3~ubuntu0.16.04.1+ | 2:10.2.0-3~ubuntu0.16.04.1+ |
ubuntu/open-vm-tools | <2:12.2.5-1ubuntu1 | 2:12.2.5-1ubuntu1 |
debian/open-vm-tools | <=2:10.3.10-1+deb10u2 | 2:10.3.10-1+deb10u6 2:11.2.5-2+deb11u3 2:12.2.0-1+deb12u2 2:12.3.5-4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this security advisory is CVE-2023-20900.
CVE-2023-20900 has a severity value of 7.5, which is classified as high.
The affected software for CVE-2023-20900 includes open-vm-tools with various versions.
To fix CVE-2023-20900, make sure to update open-vm-tools to the recommended versions provided by the software vendor.
More information about CVE-2023-20900 can be found at the following references: [link1], [link2], [link3].