Impacted Products
- VMware Tools
A SAML token signature bypass vulnerability in VMware Tools was responsibly reported to VMware. Updates are available to remediate this vulnerability in the affected VMware products.
SAML Token Signature Bypass vulnerability (CVE-2023-20900)
Description
VMware Tools contains a SAML token signature bypass vulnerability. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 7.5.
Known Attack Vectors
A malicious actor with man-in-the-middle (MITM) network positioning in the virtual machine network may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.
Resolution
To remediate CVE-2023-20900 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below.
Product | Version | Running on | CVE Identifier | CVSSv3 | Severity | Fixed Version | Workarounds | Additional Documentation |
---|---|---|---|---|---|---|---|---|
VMware Tools | 12.x.x, 11.x.x, 10.3.x | Windows | CVE-2023-20900 | 7.5 | Important | 12.3.0 | None | None |
VMware Tools | 10.3.x | Linux | CVE-2023-20900 | 7.5 | Important | [1] 10.3.26 | None | None |
[2] VMware Tools (open-vm-tools) | 12.x.x, 11.x.x, 10.3.x | Linux | CVE-2023-20900 | 7.5 | Important | [3] 12.3.0 | None | None |
Release notes: https://docs.vmware.com/en/VMware-Tools/12.3/rn/vmware-tools-1230-release-notes/index.html
- Updated OpenSSL version to 3.0.8.
- Updated libxml2 version to 2.10.4.
- Updated glib version to 2.71.1.
- Updated libffi version to 3.3.
- This release resolves CVE-2023-20900.
- From VMware Tools 12.3.0 version onwards, workload notifications for NSX distributed malware prevention is enabled.
- VMware Tools 12.3.0 version provides support for Windows Arm VMs running on VMware Fusion on Apple silicon.