First published: Wed Oct 25 2023(Updated: )
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor that has been granted Guest Operation Privileges https://docs.vmware.com/en/VMware-vSphere/8.0/vsphere-security/GUID-6A952214-0E5E-4CCF-9D2A-90948FF643EC.html in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias https://vdc-download.vmware.com/vmwb-repository/dcr-public/d1902b0e-d479-46bf-8ac9-cee0e31e8ec0/07ce8dbd-db48-4261-9b8f-c6d3ad8ba472/vim.vm.guest.AliasManager.html .
Credit: security@vmware.com security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Vmware Open Vm Tools | >=11.0.0<=12.3.0 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
All of | ||
VMware Tools | >=10.3.0<12.3.5 | |
Microsoft Windows | ||
Fedoraproject Fedora | =37 | |
Fedoraproject Fedora | =38 | |
Fedoraproject Fedora | =39 | |
redhat/open-vm-tools | <11.0.0 | 11.0.0 |
ubuntu/open-vm-tools | <2:11.0.5-4ubuntu0.18.04.3+ | 2:11.0.5-4ubuntu0.18.04.3+ |
ubuntu/open-vm-tools | <2:11.3.0-2ubuntu0~ubuntu20.04.7 | 2:11.3.0-2ubuntu0~ubuntu20.04.7 |
ubuntu/open-vm-tools | <2:12.1.5-3~ubuntu0.22.04.4 | 2:12.1.5-3~ubuntu0.22.04.4 |
ubuntu/open-vm-tools | <2:12.1.5-3ubuntu0.23.04.3 | 2:12.1.5-3ubuntu0.23.04.3 |
ubuntu/open-vm-tools | <2:12.3.0-1ubuntu0.1 | 2:12.3.0-1ubuntu0.1 |
ubuntu/open-vm-tools | <2:10.2.0-3~ubuntu0.16.04.1+ | 2:10.2.0-3~ubuntu0.16.04.1+ |
IBM Security Guardium | <=11.3 | |
IBM Security Guardium | <=11.4 | |
IBM Security Guardium | <=11.5 | |
IBM Security Guardium | <=12.0 | |
debian/open-vm-tools | 2:11.2.5-2+deb11u3 2:12.2.0-1+deb12u2 2:12.4.5-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-34058 is a vulnerability in open-vm-tools that allows a malicious actor with Guest Operation Privileges to elevate their privileges in a target virtual machine.
CVE-2023-34058 has a severity rating of 7.5 (high).
The affected software versions of open-vm-tools are 2:11.3.0-2ubuntu0~ubuntu20.04.7, 2:12.1.5-3~ubuntu0.22.04.4, 2:12.1.5-3ubuntu0.23.04.3, 2:12.3.0-1ubuntu0.1, 2:11.2.5-2+deb11u3, 2:12.2.0-1+deb12u2, 2:12.3.5-1.
To fix CVE-2023-34058, update to the recommended version of open-vm-tools: 2:11.3.0-2ubuntu0~ubuntu20.04.7, 2:12.1.5-3~ubuntu0.22.04.4, 2:12.1.5-3ubuntu0.23.04.3, 2:12.3.0-1ubuntu0.1, 2:11.2.5-2+deb11u3, 2:12.2.0-1+deb12u2, 2:12.3.5-1.
You can find more information about CVE-2023-34058 at the following references: [VMware Security Advisory](https://www.vmware.com/security/advisories/VMSA-2023-0024.html), [OpenWall mailing list](http://www.openwall.com/lists/oss-security/2023/10/27/1), [Debian Security Advisory](https://www.debian.org/security/2023/dsa-5543).