-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA256

===========================================================================
             AUSCERT External Security Bulletin Redistribution

                               ESB-2023.0637
           VMware Workstation update addresses an arbitrary file
                  deletion vulnerability (CVE-2023-20854)
                              3 February 2023

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:           VMware Workstation
Publisher:         VMWare
Operating System:  Windows
Resolution:        Patch/Upgrade
CVE Names:         CVE-2023-20854  

Original Bulletin: 
   https://www.vmware.com/security/advisories/VMSA-2023-0003.html

Comment: CVSS (Max):  7.8 CVE-2023-20854 (CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H)
         CVSS Source: VMware
         Calculator:  https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H

- --------------------------BEGIN INCLUDED TEXT--------------------

Advisory ID: VMSA-2023-0003
CVSSv3 Range: 7.8
Issue Date: 2023-02-02
Updated On: 2023-02-02 (Initial Advisory)
CVE(s): CVE-2023-20854
Synopsis: VMware Workstation update addresses an arbitrary file deletion
vulnerability (CVE-2023-20854)

1. Impacted Products

  o VMware Workstation

2. Introduction

An arbitrary file deletion vulnerability in VMware Workstation was privately
reported to VMware. Updates are available to remediate this vulnerability in
the affected VMware product.

3. Arbitrary file deletion vulnerability (CVE-2023-20854)

Description

VMware Workstation contains an arbitrary file deletion vulnerability. VMware
has evaluated the severity of this issue to be in the Important severity range
with a maximum CVSSv3 base score of 7.8.

Known Attack Vectors

A malicious actor with local user privileges on the victim's machine may
exploit this vulnerability to delete arbitrary files from the file system of
the machine on which Workstation is installed.

Resolution

To remediate CVE-2023-20854 update to the version listed in the 'Fixed Version'
column of the 'Response Matrix' found below.

Workarounds

None.

Additional Documentation

None.

Notes

None.

Acknowledgements

VMware would like to thank Frederik Reiter of cirosec GmbH for reporting this
issue to us.

Response Matrix

Product     Version Running CVE Identifier CVSSv3 Severity  Fixed   Workarounds Additional
                    On                                      Version             Documentation
VMware      17.x    Windows CVE-2023-20854 7.8    important 17.0.1  None        None
Workstation

4. References

Fixed Version(s) and Release Notes:

VMware Workstation 17.0.1:
Downloads and Documentation:
https://customerconnect.vmware.com/en/downloads/info/slug/
desktop_end_user_computing/vmware_workstation_pro/17_0
https://docs.vmware.com/en/VMware-Workstation-Pro/17.0.1/rn/
vmware-workstation-1701-pro-release-notes/index.html

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-20854

FIRST CVSSv3 Calculator:
CVE-2023-20854: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/
PR:L/UI:N/S:U/C:H/I:H/A:H

5. Change Log

2023-02-02 VMSA-2023-0003
Initial security advisory.

- --------------------------END INCLUDED TEXT--------------------

You have received this e-mail bulletin as a result of your organisation's
registration with AusCERT. The mailing list you are subscribed to is
maintained within your organisation, so if you do not wish to continue
receiving these bulletins you should contact your local IT manager. If
you do not know who that is, please send an email to auscert@auscert.org.au
and we will forward your request to the appropriate person.

NOTE: Third Party Rights
This security bulletin is provided as a service to AusCERT's members.  As
AusCERT did not write the document quoted above, AusCERT has had no control
over its content. The decision to follow or act on information or advice
contained in this security bulletin is the responsibility of each user or
organisation, and should be considered in accordance with your organisation's
site policies and procedures. AusCERT takes no responsibility for consequences
which may arise from following or acting on information or advice contained in
this security bulletin.

NOTE: This is only the original release of the security bulletin.  It may
not be updated when updates to the original are made.  If downloading at
a later date, it is recommended that the bulletin is retrieved directly
from the author's website to ensure that the information is still current.

Contact information for the authors of the original document is included
in the Security Bulletin above.  If you have any questions or need further
information, please contact them directly.

Previous advisories and external security bulletins can be retrieved from:

        https://www.auscert.org.au/bulletins/

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: https://auscert.org.au/gpg-key/
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=t19V
-----END PGP SIGNATURE-----