← Back to all briefings
Infrastructure 6 min read Published Updated Credibility 91/100

Infrastructure — VMware Workstation

VMware patched privilege escalation bugs in Workstation, Fusion, and ESXi in February 2020. VMSA-2020-0005 covers several vulnerabilities. Update your hypervisors and endpoints.

Editorially reviewed for factual accuracy

Infrastructure pillar illustration for Zeph Tech briefings
Infrastructure supply chain and reliability briefings

On , VMware published Security Advisory VMSA-2020-0005, addressing critical vulnerabilities in VMware Workstation, Fusion, and ESXi. The advisory covers CVE-2020-3947, a local privilege escalation via the vmnetdhcp service, and CVE-2020-3948, an out-of-bounds read in the Cortado ThinPrint component. Both vulnerabilities enable attackers with local access to escalate privileges on virtualization hosts.

CVE-2020-3947: vmnetdhcp Privilege Escalation

The vmnetdhcp service provides DHCP functionality for virtual networks in VMware Workstation and Fusion. This vulnerability allows a local attacker to exploit the service to execute arbitrary code with elevated privileges on the host operating system. The attack does not require administrative access to the hypervisor—a standard user account on the host machine is sufficient.

Attack scenario: A user with legitimate access to a developer workstation running VMware Workstation could exploit this vulnerability to gain root or SYSTEM privileges on the host. In enterprise environments where developers use local virtualization for testing, this represents a significant privilege escalation risk.

Exploitation complexity is rated low by VMware, indicating the vulnerability can be exploited without sophisticated techniques or specialized knowledge. Proof-of-concept code would likely emerge quickly, making timely patching essential.

CVE-2020-3948: ThinPrint Out-of-Bounds Read

The Cortado ThinPrint component enables printing from virtual machines to host-connected printers. An out-of-bounds read vulnerability in this component allows attackers to trigger denial-of-service conditions and potentially leak sensitive memory contents from the hypervisor process.

Virtual machine escape potential: While VMware categorizes this as a denial-of-service vulnerability, out-of-bounds read conditions sometimes serve as stepping stones for more severe attacks. Information leaked from hypervisor memory could include credentials, encryption keys, or memory layouts useful for chaining additional exploits.

Guest-to-host attack vector: Unlike CVE-2020-3947, which requires host access, the ThinPrint vulnerability could potentially be triggered from within a virtual machine. Organizations running untrusted virtual machines should disable ThinPrint functionality until patches are applied.

Affected Products and Versions

VMware Workstation 15.x on Windows and Linux hosts is vulnerable. The fix ships in Workstation 15.5.2. If you are affected, update all developer workstations and lab environments running Workstation installations.

VMware Fusion 11.x on macOS hosts is vulnerable. The fix ships in Fusion 11.5.2. MacOS users running virtual machines for development, testing, or application compatibility should update immediately.

VMware ESXi 6.5, 6.7, and 7.0 are affected by the ThinPrint vulnerability. Patches are available through the VMware patch repository. Production ESXi hosts typically do not enable ThinPrint, reducing exposure, but verification is recommended.

Enterprise Deployment Considerations

Organizations with centralized VMware Workstation deployments using enterprise licensing should coordinate updates through software distribution systems. The patch requires a full application update rather than a simple in-place hotfix, meaning users will experience brief interruption to running virtual machines.

Virtual machine state preservation: Workstation and Fusion updates typically preserve virtual machine configurations and snapshots. However, you should verify backup procedures before mass deployment and communicate update schedules to users with critical in-progress work in virtual environments.

Mixed version environments: Enterprises managing both Workstation and Fusion deployments across multiple platforms should coordinate updates to maintain consistent security postures. Different platform-specific update mechanisms may require separate change management workflows.

Detection and Monitoring

Endpoint detection and response (EDR) solutions should be configured to alert on suspicious vmnetdhcp process behavior. Unusual child processes, network connections, or file system access patterns from the DHCP service could show exploitation attempts.

Version verification: Your security team should audit installed VMware product versions across the environment. Workstation and Fusion self-report versions through standard software inventory mechanisms, but manual verification confirms complete coverage.

ThinPrint usage audit: Review virtual machine configurations to identify which VMs have ThinPrint enabled. Disabling the feature for VMs that do not require host printing reduces attack surface while awaiting patches.

Remediation Priority

VMware classifies both vulnerabilities with CVSSv3 scores indicating significant severity. CVE-2020-3947 receives particular urgency due to local privilege escalation potential. Developer workstations often contain source code, credentials, and access to production systems that attackers could use from elevated positions.

If you are affected, focus on patching in the following order: (1) workstations with internet exposure or external user access, (2) developer machines with access to sensitive code repositories or deployment pipelines, (3) lab and testing environments, and (4) isolated personal use installations.

Post-Patch Verification

After deploying updates, verify successful patching through VMware product version checks. Workstation displays version information in Help > About; Fusion shows version in VMware Fusion > About VMware Fusion. Automated inventory tools should be configured to flag any remaining installations below the patched versions.

Monitor security advisory feeds for potential exploit code publication. If public exploits emerge before complete patch deployment, consider temporary compensating controls such as restricting vmnetdhcp service permissions or disabling ThinPrint system-wide until updates complete.

Impact on Development Workflows

VMware Workstation and Fusion serve critical roles in software development workflows. Developers use local virtualization for testing across operating systems, validating deployment procedures, and isolating development environments from host systems.

CI/CD pipeline considerations: Build servers running VMware Workstation for automated testing require coordinated updates. Patch deployment to build infrastructure should occur during planned maintenance windows to avoid disrupting active builds.

Developer workstation updates: Individual developers may resist updates that require restarting virtual machines with in-progress work. Communicate update requirements clearly and provide adequate notice for developers to checkpoint their work.

Verification and Compliance Steps

  1. Inventory VMware products: Identify all Workstation, Fusion, and ESXi installations across the organization
  2. Verify current versions: Compare installed versions against patched releases in VMSA-2020-0005
  3. Schedule updates: Plan maintenance windows for coordinated updates across development and production infrastructure
  4. Test ThinPrint requirements: Identify VMs requiring host printing functionality; disable ThinPrint elsewhere
  5. Validate post-update: Confirm version numbers through product interfaces after patching
  6. Document remediation: Record patching activities for compliance evidence and audit trails

Security Architecture Improvements

Beyond immediate patching, you should evaluate whether desktop virtualization security architectures adequately address privilege escalation risks. Consider restricting local administrative access on workstations running VMware products, implementing application allowlisting to detect unauthorized process execution, and deploying endpoint detection tools capable of identifying vmnetdhcp exploitation patterns. Long-term security improvements reduce exposure to future hypervisor vulnerabilities.

Regular security assessments should include virtualization platforms as potential privilege escalation vectors requiring ongoing attention.

Vulnerability Details

VMware Workstation and Fusion vulnerabilities enabled guest-to-host escape and privilege escalation attacks. Desktop virtualization users faced risk of host system compromise from malicious virtual machines. Immediate patching addressed critical attack surface.

Patch Deployment

Desktop virtualization environments require coordinated update deployment. User notification and reboot scheduling minimize productivity disruption. Verification confirms successful patch application.

Security Considerations

Desktop virtualization trust models assume guest isolation. Guest escape vulnerabilities fundamentally compromise security assumptions. Defense-in-depth approaches reduce impact when isolation fails.

Monitoring and Detection

Host-based monitoring detects anomalous guest behavior potentially indicating escape attempts. Security telemetry collection supports forensic investigation of suspected incidents. Regular assessment validates virtualization security posture.

Continue in the Infrastructure pillar

Return to the hub for curated research and deep-dive guides.

Visit pillar hub

Latest guides

Coverage intelligence

Published
Coverage pillar
Infrastructure
Source credibility
91/100 — high confidence
Topics
VMware Workstation · VMware Fusion · ESXi · CVE-2020-3947 · CVE-2020-3948
Sources cited
3 sources (vmware.com, cisecurity.org)
Reading time
6 min

Documentation

  1. VMware VMSA-2020-0005 — vmware.com
  2. VMware Product Security — vmware.com
  3. CIS VMware Benchmark — cisecurity.org
  • VMware Workstation
  • VMware Fusion
  • ESXi
  • CVE-2020-3947
  • CVE-2020-3948
Back to curated briefings

Comments

Community

We publish only high-quality, respectful contributions. Every submission is reviewed for clarity, sourcing, and safety before it appears here.

    Share your perspective

    Submissions showing "Awaiting moderation" are in review. Spam, low-effort posts, or unverifiable claims will be rejected. We verify submissions with the email you provide, and we never publish or sell that address.

    Verification

    Complete the CAPTCHA to submit.