Categories: Cyber Security News

PoC Published for VMware Workstation Guest-to-Host Escape

NCC Group has published a detailed analysis of a critical guest-to-host escape vulnerability in VMware Workstation, demonstrating a complete exploitation path from a compromised virtual machine (VM) to host compromise.

The flaw resides in the VM backdoor/RPC virtual device handling logic, where crafted inputs can induce memory corruption, enabling controlled code execution within the Workstation hypervisor process on the host.

The proof-of-concept (PoC) exploit validates the real-world risk of this vulnerability and underscores the importance of timely patching in multi-VM developer endpoints and sensitive lab environments.

Vulnerability Details

The vulnerability stems from flawed boundary checks in the RPC session handling code of VMware Workstation’s backdoor interface.

By reusing the same session ID and manipulating binary size, payload offset, and payload size fields across multiple RPC packets, an attacker can trigger an out-of-bounds write in the host buffer handling routine.

This write corrupts adjacent host memory, allowing an overwrite of function pointers or metadata that redirect execution flow to attacker-controlled payloads.

The attack does not require elevated privileges within the guest operating system; any user capable of issuing RPC calls to the VMware backdoor device can initiate the exploit.

CVE Table

Field Details
CVE Guest-to-host escape in VMware Workstation
Affected Products VMware Workstation (specific vulnerable versions per NCC Group report)
Component VMware backdoor/RPC virtual device handling path
CVE IDs CVE-2023-20870 / CVE-2023-34044 and CVE-2023-20869
PoC Code See below for high-level pseudocode outline consistent with NCC Group’s description

Proof of Concept Exploit

The PoC exploit unfolds in four main stages.

First, the guest-side code opens an RPC session with the VMware backdoor device and obtains a session ID.

Next, the attacker primes the host buffer by sending a large payload packet.

A subsequent overlapping payload packet reuses the session ID, with carefully crafted size and offset parameters that force a boundary miscalculation and out-of-bounds write.

This corrupts critical host parser metadata, redirecting execution to a minimal shell payload embedded in the attacker’s data.

An optional third packet finalizes the control-flow hijack, ensuring reliable execution of attacker code when the RPC session is committed.

The high-level pseudocode sketch illustrates the logic:

text// guest-side pseudocode outline
open_vmware_backdoor();
uint32_t sid = rpc_begin_session();
// Packet A: prime host buffer
rpc_send(sid, .bin_size = A_SIZE, .payload_off = OFF_A, .payload_size = SZ_A, .data = bufA);
// Packet B: overlapping write to force OOB
rpc_send(sid, .bin_size = B_SIZE, .payload_off = OFF_B, .payload_size = SZ_B, .data = crafted_overlap);
// Optional Packet C to finalize hijack
rpc_send(sid, .bin_size = C_SIZE, .payload_off = OFF_C, .payload_size = SZ_C, .data = rop_or_shellcode);
// Trigger vulnerable processing path
rpc_commit(sid);

VMware has released security updates addressing the vulnerable RPC handling path.

Administrators should apply the latest patches immediately to remediate the flaw and prevent guest-to-host escapes.

In addition, restricting untrusted workloads on local Workstation installations is advised; high-risk testing VMs should be isolated from sensitive host data.

Continuous monitoring of the Workstation hypervisor process for anomalous child process creation and unusual file access can help detect exploitation attempts in real time.

Finally, enforcing host-level endpoint detection and response (EDR) and application control policies further constrain the behavior of the Workstation process post-compromise, limiting the attacker’s ability to pivot laterally to adjacent VMs or exfiltrate data.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post PoC Published for VMware Workstation Guest-to-Host Escape appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Superman Sequel Man of Tomorrow Filming Begins With New Image from James Gunn

Superman sequel Man of Tomorrow is officially filming, and DC Studios co-CEO James Gunn has…

1 hour ago

Bristol Native and Broadway Actor Stanley Martin Comes Home; Stars in Tony-Award Winning Musical ‘Jelly’s Last Jam’

Birthed in New Orleans during the early 20th Century, jazz is likely the earliest known…

2 hours ago

Three Injured In Early Morning Shooting

INDIANAPOLIS, Ind. (WOWO) — Police in Indianapolis are investigating a shooting that left three people…

2 hours ago

Miami Correctional Facility Death

MIAMI COUNTY, Ind. (WOWO) — On Friday, Indiana State Police started investigating an inmate’s death…

2 hours ago

‘Trek Will Resurface’: Jonathan Frakes Says Don’t Count Out Star Trek Yet

The Star Trek franchise is at a moment of uncertainty: For the first time since…

3 hours ago

‘Trek Will Resurface’: Jonathan Frakes Says Don’t Count Out Star Trek Yet

The Star Trek franchise is at a moment of uncertainty: For the first time since…

3 hours ago

This website uses cookies.