Low

VMSA-2023-0013
3.9
2023-06-13
2023-06-13 (Initial Advisory)
CVE-2023-20867
VMware Tools update addresses Authentication Bypass vulnerability (CVE-2023-20867)
1. Impacted Products
  • VMware Tools
2. Introduction

An Authentication Bypass vulnerability in VMware Tools was responsibly reported to VMware. Updates are available to remediate this vulnerability in the affected VMware products.

3a. Authentication Bypass vulnerability in VMware Tools (CVE-2023-20867)

Description

VMware Tools contains an Authentication Bypass vulnerability in the vgauth module. VMware has evaluated the severity of this issue to be in the Low severity range with a maximum CVSSv3 base score of 3.9.

Known Attack Vectors

A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine.

Resolution

To remediate CVE-2023-20867 update to the version listed in the 'Fixed Version' column of the 'Response Matrix' found below.

Workarounds

None.

Additional Documentation

Given the requirement that an attacker must have root access over ESXi to exploit the vulnerability described by CVE-2023-20867, please review 'vSphere Security: Proactive and Continuous' which describes a holistic approach to security best practices.

Notes

None.

Acknowledgements

VMware would like to thank Mandiant for reporting this issue to us.

Response Matrix

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation
VMware Tools
12.x.x, 11.x.x, 10.3.x
Any
CVE-2023-20867
low
None
4. References
5. Change Log

2023-06-13 VMSA-2023-0013

Initial security advisory.

6. Contact