First published: Mon May 01 2023(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of VMware Workstation. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation and ESXi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-CAN-20773 is classified as high due to its potential for privilege escalation.
To fix ZDI-CAN-20773, ensure you update to the latest version of VMware Workstation that includes the security patch addressing this vulnerability.
ZDI-CAN-20773 affects local users with the ability to execute high-privileged code on VMware Workstation installations.
ZDI-CAN-20773 is a privilege escalation vulnerability that allows local attackers to gain elevated rights.
No, ZDI-CAN-20773 cannot be exploited remotely as it requires local access and high-privileged code execution.