VMware Fusion (11.x before 11.5.2), VMware Remote Console for Mac (11.x and prior before 11.0.1) and Horizon Client for Mac (5.x and prior before 5.4.0) contain a privilege escalation vulnerability due to improper use of setuid binaries. Successful exploitation of this issue may allow attackers with normal user privileges to escalate their privileges to root on the system where Fusion, VMRC or Horizon Client is installed.
Published 2020-03-17 19:15:12
Updated 2022-07-12 17:42:04
Source VMware
View at NVD,   CVE.org
Vulnerability category: Gain privilege

CVE-2020-3950 is in the CISA Known Exploited Vulnerabilities Catalog

CISA vulnerability name:
VMware Multiple Products Privilege Escalation Vulnerability
CISA required action:
Apply updates per vendor instructions.
CISA description:
VMware Fusion, Remote Console (VMRC) for Mac, and Horizon Client for Mac contain a privilege escalation vulnerability due to improper use of setuid binaries that allows attackers to escalate privileges to root.
Added on 2021-11-03 Action due date 2022-05-03

Exploit prediction scoring system (EPSS) score for CVE-2020-3950

Probability of exploitation activity in the next 30 days EPSS Score History
~ 75 %
Percentile, the proportion of vulnerabilities that are scored at or less

Metasploit modules for CVE-2020-3950

  • VMware Fusion USB Arbitrator Setuid Privilege Escalation
    Disclosure Date: 2020-03-17
    First seen: 2020-04-26
    This exploits an improper use of setuid binaries within VMware Fusion 10.1.3 - 11.5.3. The Open VMware USB Arbitrator Service can be launched outide of its standard path which allows loading of an attacker controlled binary. By creating a payload in the user

CVSS scores for CVE-2020-3950

Base Score Base Severity CVSS Vector Exploitability Score Impact Score Score Source First Seen

CWE ids for CVE-2020-3950

  • The product does not properly assign, modify, track, or check privileges for an actor, creating an unintended sphere of control for that actor.
    Assigned by: nvd@nist.gov (Primary)

References for CVE-2020-3950

Products affected by CVE-2020-3950

This web site uses cookies for managing your session, storing preferences, website analytics and additional purposes described in our privacy policy.
By using this web site you are agreeing to CVEdetails.com terms of use!