An uncontrolled search path vulnerability in VMware Tools for Windows was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products.
Known Attack Vectors
A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element.
To remediate CVE-2022-22943 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.
VMware would like to thank the Lockheed Martin Red Team and Jens Lewandowski & Stefan Müller of CERT-BA (Federal Employment Agency Germany) for reporting this vulnerability to us.
Fixed Version(s) and Release Notes:
VMware Tools for Windows 12.0.0
Downloads and Documentation:
Mitre CVE Dictionary Links:
FIRST CVSSv3 Calculator:
Initial security advisory.
E-mail list for product security notifications and announcements:
This Security Advisory is posted to the following lists:
PGP key at:
VMware Security Advisories
VMware Security Response Policy
VMware Lifecycle Support Phases
VMware Security & Compliance Blog
Copyright 2022 VMware Inc. All rights reserved.