Categories: Cyber Security News

PoC Published for VMware Workstation Guest-to-Host Escape

NCC Group has published a detailed analysis of a critical guest-to-host escape vulnerability in VMware Workstation, demonstrating a complete exploitation path from a compromised virtual machine (VM) to host compromise.

The flaw resides in the VM backdoor/RPC virtual device handling logic, where crafted inputs can induce memory corruption, enabling controlled code execution within the Workstation hypervisor process on the host.

The proof-of-concept (PoC) exploit validates the real-world risk of this vulnerability and underscores the importance of timely patching in multi-VM developer endpoints and sensitive lab environments.

Vulnerability Details

The vulnerability stems from flawed boundary checks in the RPC session handling code of VMware Workstation’s backdoor interface.

By reusing the same session ID and manipulating binary size, payload offset, and payload size fields across multiple RPC packets, an attacker can trigger an out-of-bounds write in the host buffer handling routine.

This write corrupts adjacent host memory, allowing an overwrite of function pointers or metadata that redirect execution flow to attacker-controlled payloads.

The attack does not require elevated privileges within the guest operating system; any user capable of issuing RPC calls to the VMware backdoor device can initiate the exploit.

CVE Table

Field Details
CVE Guest-to-host escape in VMware Workstation
Affected Products VMware Workstation (specific vulnerable versions per NCC Group report)
Component VMware backdoor/RPC virtual device handling path
CVE IDs CVE-2023-20870 / CVE-2023-34044 and CVE-2023-20869
PoC Code See below for high-level pseudocode outline consistent with NCC Group’s description

Proof of Concept Exploit

The PoC exploit unfolds in four main stages.

First, the guest-side code opens an RPC session with the VMware backdoor device and obtains a session ID.

Next, the attacker primes the host buffer by sending a large payload packet.

A subsequent overlapping payload packet reuses the session ID, with carefully crafted size and offset parameters that force a boundary miscalculation and out-of-bounds write.

This corrupts critical host parser metadata, redirecting execution to a minimal shell payload embedded in the attacker’s data.

An optional third packet finalizes the control-flow hijack, ensuring reliable execution of attacker code when the RPC session is committed.

The high-level pseudocode sketch illustrates the logic:

text// guest-side pseudocode outline
open_vmware_backdoor();
uint32_t sid = rpc_begin_session();
// Packet A: prime host buffer
rpc_send(sid, .bin_size = A_SIZE, .payload_off = OFF_A, .payload_size = SZ_A, .data = bufA);
// Packet B: overlapping write to force OOB
rpc_send(sid, .bin_size = B_SIZE, .payload_off = OFF_B, .payload_size = SZ_B, .data = crafted_overlap);
// Optional Packet C to finalize hijack
rpc_send(sid, .bin_size = C_SIZE, .payload_off = OFF_C, .payload_size = SZ_C, .data = rop_or_shellcode);
// Trigger vulnerable processing path
rpc_commit(sid);

VMware has released security updates addressing the vulnerable RPC handling path.

Administrators should apply the latest patches immediately to remediate the flaw and prevent guest-to-host escapes.

In addition, restricting untrusted workloads on local Workstation installations is advised; high-risk testing VMs should be isolated from sensitive host data.

Continuous monitoring of the Workstation hypervisor process for anomalous child process creation and unusual file access can help detect exploitation attempts in real time.

Finally, enforcing host-level endpoint detection and response (EDR) and application control policies further constrain the behavior of the Workstation process post-compromise, limiting the attacker’s ability to pivot laterally to adjacent VMs or exfiltrate data.

Find this Story Interesting! Follow us on Google NewsLinkedIn and X to Get More Instant Updates

The post PoC Published for VMware Workstation Guest-to-Host Escape appeared first on Cyber Security News.

rssfeeds-admin

Recent Posts

Market Basket board had authority to remove Artie T. Demoulas, despite being a good CEO, judge rules

The firing of Arthur T. Demoulas, the now-former Market Basket CEO popularly known as “Artie…

11 minutes ago

Market Basket board had authority to remove Artie T. Demoulas, despite being a good CEO, judge rules

The firing of Arthur T. Demoulas, the now-former Market Basket CEO popularly known as “Artie…

11 minutes ago

Kicking off the golf season at Beaver Meadow with spring weather

The first week of the season at Beaver Meadow Golf Course, which opened on April…

11 minutes ago

Kicking off the golf season at Beaver Meadow with spring weather

The first week of the season at Beaver Meadow Golf Course, which opened on April…

11 minutes ago

Sister of Jason Rothe files wrongful death lawsuit against NH prison guards, nearly three years after his death

The estate of Jason Rothe, a patient at the state’s Secure Psychiatric Unit who died…

11 minutes ago

Sister of Jason Rothe files wrongful death lawsuit against NH prison guards, nearly three years after his death

The estate of Jason Rothe, a patient at the state’s Secure Psychiatric Unit who died…

11 minutes ago

This website uses cookies.