Vulnerability Details : CVE-2015-3650
vmware-vmx.exe in VMware Workstation 7.x through 10.x before 10.0.7 and 11.x before 11.1.1, VMware Player 5.x and 6.x before 6.0.7 and 7.x before 7.1.1, and VMware Horizon Client 5.x local-mode before 5.4.2 on Windows does not provide a valid DACL pointer during the setup of the vprintproxy.exe process, which allows host OS users to gain host OS privileges by injecting a thread.
Products affected by CVE-2015-3650
- cpe:2.3:a:vmware:workstation:10.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:10.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:10.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:10.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:10.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:10.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:11.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:11.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:workstation:10.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:7.1:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:player:6.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:horizon_view_client:5.4:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:horizon_view_client:5.4.1:*:*:*:*:*:*:*
Threat overview for CVE-2015-3650
Top countries where our scanners detected CVE-2015-3650
Top open port discovered on systems with this issue
443
IPs affected by CVE-2015-3650 97
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2015-3650!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2015-3650
0.13%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 34 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2015-3650
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.2
|
HIGH | AV:L/AC:L/Au:N/C:C/I:C/A:C |
3.9
|
10.0
|
NIST |
CWE ids for CVE-2015-3650
-
The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.Assigned by: nvd@nist.gov (Primary)
References for CVE-2015-3650
-
http://www.vmware.com/security/advisories/VMSA-2015-0005.html
VMSA-2015-0005Patch;Vendor Advisory
-
http://www.securitytracker.com/id/1032822
VMware Horizon View Client Access Control Flaw Lets Local Users Gain Elevated Privileges on the Host System - SecurityTracker
-
http://www.securitytracker.com/id/1032823
VMware Workstation/Player Access Control Flaw Lets Local Users Gain Elevated Privileges on the Host System - SecurityTracker
-
https://www.nettitude.co.uk/vmware-multiple-products-privilege-escalation/
VMware Multiple Products - Privilege Escalation
Jump to