CVE-2018-6964
📋 TL;DR
This CVE describes a local privilege escalation vulnerability in VMware Horizon Client for Linux. Unprivileged users can exploit insecure SUID binary usage to gain root privileges on affected systems. Only Linux systems running vulnerable versions of Horizon Client are affected.
💻 Affected Systems
- VMware Horizon Client for Linux
📦 What is this software?
⚠️ Risk & Real-World Impact
Worst Case
An attacker with local access gains full root privileges, enabling complete system compromise, data theft, persistence establishment, and lateral movement.
Likely Case
Malicious insider or compromised user account escalates to root, potentially accessing sensitive data or installing malware.
If Mitigated
With proper access controls and monitoring, impact is limited to isolated client systems without critical data.
🎯 Exploit Status
Exploitation requires local access to the system. SUID binary vulnerabilities are commonly exploited.
🛠️ Fix & Mitigation
✅ Official Fix
Patch Version: 4.8.0 or later
Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2018-0014.html
Restart Required: No
Instructions:
1. Download VMware Horizon Client 4.8.0 or later from VMware website. 2. Uninstall current version. 3. Install updated version. 4. Verify installation.
🔧 Temporary Workarounds
Remove SUID bit from vulnerable binary
linuxTemporarily remove SUID permissions from the vulnerable binary to prevent privilege escalation
sudo chmod u-s /path/to/horizon/binary
Restrict access to Horizon Client
linuxLimit which users can execute Horizon Client to reduce attack surface
sudo chmod 750 /opt/vmware/horizon-client/
sudo chown root:trustedusers /opt/vmware/horizon-client/
🧯 If You Can't Patch
- Implement strict access controls to limit who can use Horizon Client
- Monitor for privilege escalation attempts and unusual root activity
🔍 How to Verify
Check if Vulnerable:
Check Horizon Client version: dpkg -l | grep horizon-client or rpm -qa | grep horizon-client. If version is 4.x and less than 4.8.0, system is vulnerable.
Check Version:
horizon-client --version 2>/dev/null || dpkg -l | grep horizon-client || rpm -qa | grep horizon-client
Verify Fix Applied:
Verify installed version is 4.8.0 or higher using version check command.
📡 Detection & Monitoring
Log Indicators:
- Sudden privilege escalation events
- Unusual SUID binary execution
- Failed sudo attempts followed by successful Horizon Client execution
Network Indicators:
- None - this is a local privilege escalation
SIEM Query:
source="linux_audit" AND (event_type="EXECVE" AND path="/opt/vmware/horizon-client/*" AND uid_change) OR (event_type="SYSCALL" AND success="yes" AND exe="/opt/vmware/horizon-client/*" AND uid!=euid)