A privilege escalation vulnerability affecting VMware Horizon Client for Windows was privately reported to VMware. Updates are available to address this vulnerability in affected VMware products.
Known Attack Vendors
A local user on the system where the software is installed may exploit this issue to run commands as any user.
To remediate CVE-2020-3961 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' below.
VMware would like to thank Nuttakorn Tungpoonsup and Ammarit Thongthua of Secure D Center Research Team, Secure D Center Co.,Ltd. and Cybersecurity Researcher, Sittikorn Sangrattanapitak for reporting this issue to us.
|Product||Version||Running On||CVE Identifier||CVSSv3||Severity||Fixed Version||Workarounds||Additional Documentation|
Horizon Client for Windows
5.x and prior
Fixed Version(s) and Release Notes:
VMware Horizon Client 5.4.3
Downloads and Documentation:
Mitre CVE Dictionary Links:
FIRST CVSSv3 Calculator:
Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2020 VMware Inc. All rights reserved.