Vulnerability Name: | CVE-2019-5512 (CCN-158217) | ||||||||||||
Assigned: | 2019-03-14 | ||||||||||||
Published: | 2019-03-14 | ||||||||||||
Updated: | 2020-08-24 | ||||||||||||
Summary: | VMware Workstation (15.x before 15.0.3, 14.x before 14.1.6) running on Windows does not handle COM classes appropriately. Successful exploitation of this issue may allow hijacking of COM classes used by the VMX process, on a Windows host, leading to elevation of privilege. | ||||||||||||
CVSS v3 Severity: | 8.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H) 7.9 High (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:P/RL:O/RC:C)
7.0 High (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:P/RL:O/RC:C)
| ||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||
Vulnerability Type: | CWE-noinfo | ||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||
References: | Source: MITRE Type: CNA CVE-2019-5512 Source: XF Type: UNKNOWN vmware-cve20195512-priv-esc(158217) Source: CCN Type: Packet Storm Security [03-25-2019] VMware Host VMX Process COM Class Hijack Privilege Escalation Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-25-2019] Source: CCN Type: VMware Security Advisory VMSA-2019-0002 VMware Workstation update addresses elevation of privilege issues Source: MISC Type: Patch, Vendor Advisory https://www.vmware.com/security/advisories/VMSA-2019-0002.html | ||||||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||||||
BACK |