
Cloud Vulnerability DB
A community-led vulnerabilities database
VMware Workstation (15.x before 15.5.2) and Fusion (11.x before 11.5.2) contain a critical use-after-free vulnerability (CVE-2020-3947) in the vmnetdhcp component. The vulnerability was disclosed on March 12, 2020, and VMware has evaluated its severity to be in the Critical range with a maximum CVSSv3 base score of 9.3 (VMware Advisory).
The vulnerability is caused by a use-after-free bug specifically in the vmnetdhcp component of VMware Workstation and Fusion. The issue has been assigned a critical severity rating with a CVSSv3 base score of 9.3, indicating its high potential for exploitation (SecurityWeek).
Successful exploitation of this vulnerability can lead to code execution on the host system from the guest operating system, or allow attackers to create a denial-of-service condition of the vmnetdhcp service running on the host machine (VMware Advisory, SecurityWeek).
VMware has released patches to address this vulnerability. Users should upgrade to Workstation version 15.5.2 or Fusion version 11.5.2, depending on their product. No workarounds are available for this vulnerability, making the patch installation critical (VMware Advisory).
Source: This report was generated using AI
Free Vulnerability Assessment
Evaluate your cloud security practices across 9 security domains to benchmark your risk level and identify gaps in your defenses.
Get a personalized demo
"Best User Experience I have ever seen, provides full visibility to cloud workloads."
"Wiz provides a single pane of glass to see what is going on in our cloud environments."
"We know that if Wiz identifies something as critical, it actually is."