CVE-2023-34044

7.1 HIGH

📋 TL;DR

This vulnerability allows an attacker with local administrative privileges on a VMware virtual machine to read privileged information from hypervisor memory via an out-of-bounds read in Bluetooth device sharing functionality. It affects VMware Workstation 17.x prior to 17.5 and VMware Fusion 13.x prior to 13.5. The attacker must already have compromised the virtual machine to exploit this vulnerability.

💻 Affected Systems

Products:
  • VMware Workstation
  • VMware Fusion
Versions: Workstation 17.x prior to 17.5, Fusion 13.x prior to 13.5
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations where Bluetooth device sharing is enabled between host and virtual machine. The attacker must have local administrative privileges on the virtual machine.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrative access to a virtual machine could read sensitive hypervisor memory, potentially exposing credentials, encryption keys, or other privileged data from the host system.

🟠

Likely Case

An attacker who has already compromised a virtual machine could escalate their access by extracting host system information or credentials from memory.

🟢

If Mitigated

With proper access controls limiting administrative privileges within virtual machines, the attack surface is significantly reduced as the exploit requires local admin rights.

🌐 Internet-Facing: LOW - This vulnerability requires local administrative access to a virtual machine and cannot be exploited remotely over the internet.
🏢 Internal Only: MEDIUM - While it requires local admin access on a VM, in environments where VMs are shared or where attackers have already compromised VMs, this could lead to host system information disclosure.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires administrative privileges on the virtual machine and knowledge of memory manipulation techniques. No public exploits have been reported as of the advisory date.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Workstation 17.5 or later, Fusion 13.5 or later

Vendor Advisory: https://www.vmware.com/security/advisories/VMSA-2023-0022.html

Restart Required: Yes

Instructions:

1. Download and install VMware Workstation 17.5 or later from the official VMware website. 2. Download and install VMware Fusion 13.5 or later from the official VMware website. 3. Restart the host system after installation. 4. Verify the update was successful by checking the version number.

🔧 Temporary Workarounds

Disable Bluetooth Sharing

all

Disable Bluetooth device sharing between host and virtual machines to remove the vulnerable component.

In VMware settings, navigate to 'Bluetooth' section and disable 'Share Bluetooth devices with the virtual machine'

Restrict Administrative Privileges

all

Limit administrative access on virtual machines to trusted users only to reduce attack surface.

Use standard user accounts for daily operations on virtual machines
Implement least privilege principles for VM administration

🧯 If You Can't Patch

  • Disable Bluetooth device sharing functionality in all virtual machine configurations
  • Implement strict access controls to limit who has administrative privileges on virtual machines

🔍 How to Verify

Check if Vulnerable:

Check VMware version: Workstation versions 17.0-17.4.9 or Fusion versions 13.0-13.4.2 are vulnerable if Bluetooth sharing is enabled.

Check Version:

On Windows: 'vmware -v' in command prompt. On Linux/macOS: 'vmware --version' in terminal.

Verify Fix Applied:

Verify installed version is Workstation 17.5 or later, or Fusion 13.5 or later. Confirm Bluetooth sharing functionality works without security warnings.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory access patterns from virtual machines
  • Multiple failed attempts to access Bluetooth sharing functionality
  • Unexpected administrative privilege escalation within VMs

Network Indicators:

  • Local Bluetooth protocol anomalies between host and VM

SIEM Query:

source="vmware_logs" AND (event_type="memory_access" OR event_type="bluetooth_share") AND severity="high"

🔗 References

📤 Share & Export