VMware Carbon Black Cloud macOS Sensor
A file overwrite issue affecting the installation of the Carbon Black Cloud Sensor for macOS, was privately reported to VMware. The issue has been addressed in the latest version of the installer.
Known Attack Vectors
A malicious actor who has local access to the endpoint on which a macOS sensor is going to be installed, may overwrite a limited number of files with output from the sensor installation. The malicious actor would have to trick a victim to install malware in order to obtain such access. Exploitation of this issue can only occur at a specific point of time during the installation process and depends on specific conditions.
To remediate CVE-2020-4008 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' below.
VMware would like to thank Jimi Sebree of Tenable Research for reporting this issue to us.
Fixed Version(s) and Release Notes:
Mitre CVE Dictionary Links:
FIRST CVSSv3 Calculator:
Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2020 VMware Inc. All rights reserved.