
=====================================================================

                                   CERT-Renater

                        Note d'Information No. 2022/VULN280

_____________________________________________________________________

DATE                : 24/08/2022

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S): Systems running VMware Tools versions prior to
                                   12.1.0, 10.3.25.

=====================================================================
https://www.vmware.com/security/advisories/VMSA-2022-0024.html
_____________________________________________________________________

Important

Advisory ID:    VMSA-2022-0024
CVSSv3 Range:   7.0
Issue Date:     2022-08-23
Updated On:     2022-08-23 (Initial Advisory)
CVE(s):         CVE-2022-31676


Synopsis:
VMware Tools update addresses a local privilege escalation vulnerability
(CVE-2022-31676)


1. Impacted Products

      VMware Tools

2. Introduction

VMware Tools was impacted by a local privilege escalation vulnerability.
Updates are available to remediate this vulnerability in affected
VMware products.


3. Local privilege escalation vulnerability (CVE-2022-31676)

Description

VMware Tools contains a local privilege escalation vulnerability.
VMware has evaluated the severity of this issue to be in the
Important severity range with a maximum CVSSv3 base score of 7.0.


Known Attack Vectors

A malicious actor with local non-administrative access to the Guest
OS can escalate privileges as a root user in the virtual machine.


Resolution

To remediate CVE-2022-31676 apply the patches listed in the 'Fixed
Version' column of the 'Response Matrix' found below.


Workarounds

None.


Additional Documentation

None.


Notes

VMware Tools 10.3.25 only applies to the older Linux releases.


Acknowledgements

None.


Response Matrix


Product      Version    Running On    CVE Identifier    CVSSv3
Severity    Fixed Version    Workarounds    Additional Documentation

VMware Tools  12.x.y, 11.x.y   Windows   CVE-2022-31676   7.0  important 
    12.1.0   None   None

VMware Tools   12.x.y, 11.x.y   Linux   CVE-2022-31676   7.0
important   12.1.0   None   None

VMware Tools   10.x.y   Linux   CVE-2022-31676   7.0   important
10.3.25   None   None


4. References

Fixed Version(s) and Release Notes:

VMware Tools 12.1.0

Downloads and Documentation:

https://customerconnect.vmware.com/downloads/details?downloadGroup=VMTOOLS1210&productId=1259&rPId=92824

https://docs.vmware.com/en/VMware-Tools/12.1/rn/VMware-Tools-1210-Release-Notes.html

VMware Tools 10.3.25

https://customerconnect.vmware.com/downloads/details?downloadGroup=VMTOOLS10325&productId=1072&rPId=92945

https://docs.vmware.com/en/VMware-Tools/10.3/rn/VMware-Tools-10325-Release-Notes.html

Mitre CVE Dictionary Links:

https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2022-31676

FIRST CVSSv3 Calculator:

CVE-2022-31676: 
https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H


5. Change Log

2022-08-23 VMSA-2022-0024
Initial security advisory.


6. Contact

E-mail list for product security notifications and announcements:
https://lists.vmware.com/cgi-bin/mailman/listinfo/security-announce

   This Security Advisory is posted to the following lists:
security-announce@lists.vmware.com  bugtraq@securityfocus.com 
fulldisclosure@seclists.org

E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055

   VMware Security Advisories
https://www.vmware.com/security/advisories

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html

   VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html

   VMware Security & Compliance Blog
https://blogs.vmware.com/security

   Twitter
https://twitter.com/VMwareSRC


Copyright 2022 VMware Inc. All rights reserved.

=========================================================
+ CERT-RENATER        |    tel : 01-53-94-20-44         +
+ 23/25 Rue Daviel    |    fax : 01-53-94-20-41         +
+ 75013 Paris         |   email:cert@support.renater.fr +
=========================================================


