VMware is a system that allows to operate as a virtualization software, emulating a physical system with certain hardware characteristics. When the program is executed, it provides an execution environment similar to all effects to a physical computer (except in the pure physical access to the simulated hardware), with CPU (it can be more than one), BIOS, graphics card, RAM memory, network card, sound system, USB connection, hard disk, etc. which, like the above, can be more than one and activated simultaneously.
But what happens is that VMware released both critical and high severity vulnerabilities, which could allow an attacker to execute code on the host, deny vmnetdhcp service on the host, local escalation of privileges or execute commands like another user.
Vulnerabilities in the VMware system
▸VMware Workstation and Fusion contain a use-after vulnerability in vmnetdhcp that could allow an attacker to execute code on the guest host or create a denial of service condition in vmnetdhcp that runs on the hostel machine that was identified and I assign as CVE-2020-3947.
▸It is known as CVE-2020-4005 and carrying a score of 8.8, it is found in the way certain system calls are handled in the VMX process and that could lead to an elevation of privilege on the affected system. According to WMware, this security problem would be more complex to exploit successfully since it would be required to concatenate it with some other vulnerability
▸Identified as CVE-2020-4004 and with a CVSS score of 9.3 out of 10, it is related to the use of previously released memory elements in the WMware ESXi USB 3.0 xHCI (eXtensible Host Controller Interface) driver. This vulnerability could allow a malicious user with privileges on a virtual machine to execute arbitrary code such as the VMX process running on the host computer.