VMware Host Code Execution Vulnerabilities

VMware has released a security advisory document that includes three flaws that can be exploited by a malicious attacker to launch attacks against a number of VMware products.

The most severe relates to an out-of-bounds write vulnerability in super video graphics array. For this vulnerability to be exploited an attacker would need to gain low-level privileges on the guest Virtual Machine (VM).

The second vulnerability is a denial of service (DoS) type where an attacker with an unprivileged account on a guest operating system (OS) can cause the virtual environment to crash.

The final vulnerability is a stored cross-site scripting (XSS) flaw.  This can be used as a privilege escalation attack.

Affected Platforms:

ESXi 5.5
ESXi 6.0
ESXi 6.5
vCenter Server 5.5
vCenter Server 6.0
vCenter Server 6.5
Fusion 8.x
Workstation 12.x


  • Ensure patches are applied at the earliest available opportunity. Prioritise deployments where untrusted guests OS are in use.
  • Where untrusted guests OS are in use, consider additional segregation from core network services.

Duncan Newell

Duncan is a technology professional with over 20 years experience of working in various IT roles. He has a interest in cyber security, and has a wide range of other skills in radio, electronics and telecommunications.

Leave a Reply

This site uses Akismet to reduce spam. Learn how your comment data is processed.

%d bloggers like this: