=================================================================== CERT-Renater Note d'Information No. 2021/VULN097 ____________________________________________________________________ DATE : 02/03/2022 HARDWARE PLATFORM(S): / OPERATING SYSTEM(S) : Windows running VMware Tools for Windows versions prior to 12.0.0. ====================================================================https://www.vmware.com/security/advisories/VMSA-2022-0007.html _____________________________________________________________________ Moderate Advisory ID: VMSA-2022-0007 CVSSv3 Range: 5.6 Issue Date: 2022-03-01 Updated On: 2022-03-01 (Initial Advisory) CVE(s): CVE-2022-22943 Synopsis: VMware Tools for Windows update addresses an uncontrolled search path vulnerability (CVE-2022-22943) 1. Impacted Products VMware Tools for Windows 2. Introduction An uncontrolled search path vulnerability in VMware Tools for Windows was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products. 3. VMware Tools for Windows update addresses an uncontrolled search path vulnerability (CVE-2022-22943) Description VMware Tools for Windows contains an uncontrolled search path vulnerability. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.6. Known Attack Vectors A malicious actor with local administrative privileges in the Windows guest OS, where VMware Tools is installed, may be able to execute code with system privileges in the Windows guest OS due to an uncontrolled search path element. Resolution To remediate CVE-2022-22943 apply the patches listed in the 'Fixed Version' column of the 'Response Matrix' found below. Workarounds None. Additional Documentation None. Notes None. Acknowledgements VMware would like to thank the Lockheed Martin Red Team and Jens Lewandowski & Stefan Müller of CERT-BA (Federal Employment Agency Germany) for reporting this vulnerability to us. Response Matrix Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version Workarounds Additional Documentation VMware Tools for Windows 11.x.y and 10.x.y Windows CVE-2022-22943 5.6 moderate 12.0.0 None None 4. References Fixed Version(s) and Release Notes: VMware Tools for Windows 12.0.0 Downloads and Documentation: https://customerconnect.vmware.com/en/downloads/details?downloadGroup=VMTOOLS1200&productId59&rPId…322 https://docs.vmware.com/en/VMware-Tools/12.0/rn/VMware-Tools-1200-Release-Notes.html Mitre CVE Dictionary Links: https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-22943 FIRST CVSSv3 Calculator: CVE-2022-22943: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:U/C:L/I:H/A:L 5. Change Log 2022-03-01 VMSA-2022-0007 Initial security advisory. 6. Contact E-mail list for product security notifications and announcements: https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce This Security Advisory is posted to the following lists: security-announce@lists.vmware.com bugtraq@securityfocus.com fulldisclosure@seclists.org E-mail: security@vmware.com PGP key at: https://kb.vmware.com/kb/1055 VMware Security Advisories https://www.vmware.com/security/advisories VMware Security Response Policy https://www.vmware.com/support/policies/security_response.html VMware Lifecycle Support Phases https://www.vmware.com/support/policies/lifecycle.html VMware Security & Compliance Blog https://blogs.vmware.com/security Twitter https://twitter.com/VMwareSRC Copyright 2022 VMware Inc. All rights reserved. ========================================================+ CERT-RENATER | tel : 01-53-94-20-44 + + 23/25 Rue Daviel | fax : 01-53-94-20-41 + + 75013 Paris | email:cert@support.renater.fr + =======================================================