07 September 23, 08:56
(This post was last modified: 07 September 23, 08:56 by harlan4096.)
Quote:Impacted ProductsSource
- VMware Tools
Quote:A SAML token signature bypass vulnerability in VMware Tools was responsibly reported to VMware. Updates are available to remediate this vulnerability in the affected VMware products.
SAML Token Signature Bypass vulnerability (CVE-2023-20900)
Quote:Description
VMware Tools contains a SAML token signature bypass vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5.
Known Attack Vectors
A malicious actor with man-in-the-middle (MITM) network positioning in the virtual machine network may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.
Release notes: https://docs.vmware.com/en/VMware-Tools/...index.html
Quote:...
- Updated OpenSSL version to 3.0.8.
- Updated libxml2 version to 2.10.4.
- Updated glib version to 2.71.1.
- Updated libffi version to 3.3.
- This release resolves CVE-2023-20900.
- From VMware Tools 12.3.0 version onwards, workload notifications for NSX distributed malware prevention is enabled.
- VMware Tools 12.3.0 version provides support for Windows Arm VMs running on VMware Fusion on Apple silicon.