Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

Posted on October 2, 2025October 2, 2025 By CWS

A proof-of-concept (PoC) exploit has been launched for a crucial vulnerability chain in VMware Workstation that enables an attacker to flee from a visitor digital machine and execute arbitrary code on the host working system.

The exploit efficiently chains collectively an data leak and a stack-based buffer overflow vulnerability to realize a full guest-to-host escape, some of the extreme varieties of safety flaws in virtualization software program.

The exploit targets vulnerabilities that had been first demonstrated on the Pwn2Own Vancouver occasion in 2023. Safety researcher Alexander Zaviyalov of NCC Group just lately revealed an in depth technical evaluation and a practical PoC, demonstrating the sensible danger posed by these flaws.

The Two-Stage Assault

The guest-to-host escape is achieved by chaining two distinct vulnerabilities discovered within the digital Bluetooth gadget performance of VMware Workstation. This function, which is enabled by default, permits a visitor VM to make use of the host’s Bluetooth adapter.

Data Leak (CVE-2023-20870, CVE-2023-34044): The primary stage of the assault leverages a Use-After-Free (UAF) reminiscence leak. By sending particularly crafted USB Request Block (URB) management transfers to the digital mouse and Bluetooth units, an attacker can leak reminiscence pointers from the vmware-vmx.exe course of on the host.

This data leak is essential for bypassing Tackle Area Format Randomization (ASLR), a normal safety function that randomizes reminiscence areas to make exploitation harder.

Exploit

Buffer Overflow (CVE-2023-20869): With ASLR bypassed, the attacker proceeds to the second stage. This entails triggering a stack-based buffer overflow by sending a malicious Service Discovery Protocol (SDP) packet from the visitor VM to a different Bluetooth gadget discoverable by the host.

The overflow permits the attacker to hijack this system’s execution circulate, and with the beforehand leaked reminiscence addresses, they will execute a customized payload on the host system.

The mix of those vulnerabilities permits an attacker with management over a visitor VM to realize full management of the host machine. Within the demonstration, the exploit efficiently launched a reverse shell from a Linux visitor to a totally patched Home windows 11 host, successfully compromising the underlying system, Alexander Zaviyalov stated.

The complete exploit chain primarily impacts VMware Workstation 17.0.1 and earlier variations. The precise vulnerabilities have completely different patch timelines:

The stack-based buffer overflow (CVE-2023-20869) was addressed in model 17.0.2.vmware-workstation-guest-to-host-escape.pdf

The reminiscence leak vulnerabilities (CVE-2023-20870 and CVE-2023-34044) had been patched throughout variations 17.0.2 and 17.5.0, respectively.vmware-workstation-guest-to-host-escape.pdf

As a result of the whole exploit requires each the buffer overflow and the reminiscence leak, customers working model 17.0.1 or older are on the highest danger.

Mitigations

The first suggestion for all customers is to replace their VMware Workstation software program to the newest accessible model (17.5.0 or newer), which comprises patches for all of the mentioned vulnerabilities.

For customers who can’t instantly replace, a possible workaround is to disable the digital Bluetooth gadget. This may be completed by unchecking the “Share Bluetooth units with the digital machine” possibility within the digital machine’s USB Controller settings.

Disabling this function removes the assault floor exploited by this particular PoC. The detailed analysis highlights the complexity of recent exploits and underscores the significance of well timed patching for virtualization platforms.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Escape, Exploit, guesttohost, PoC, Released, VMware, Vulnerability, Workstation

Post navigation

Previous Post: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
Next Post: Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency

Related Posts

GitGuardian Ends 2025 with Strong Enterprise Momentum GitGuardian Ends 2025 with Strong Enterprise Momentum Cyber Security News
CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 CISA Expands KEV Catalog with 1,484 New Vulnerabilities as Active Exploitation Surges 20% in 2025 Cyber Security News
Alice Blue Partners With AccuKnox For Regulatory Compliance Alice Blue Partners With AccuKnox For Regulatory Compliance Cyber Security News
10 Best Enterprise Remote Access Software 10 Best Enterprise Remote Access Software Cyber Security News
New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines New Stealthy Python Malware Leverages Discord to Steal Data From Windows Machines Cyber Security News
GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware GOLD SALEM Compromise Networks and Bypass Security Solutions to Deploy Warlock Ransomware Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • India to Prohibit Chinese CCTV Sales by 2026
  • FBI Verifies Email Breach as US Offers Reward for Hackers
  • Critical F5 BIG-IP Vulnerability Now Actively Exploited
  • China-Linked Cyber Threats Target Southeast Asian Government
  • AI-Powered VoidLink Malware Framework Poses New Cyber Threat

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark