Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

Posted on October 2, 2025October 2, 2025 By CWS

A proof-of-concept (PoC) exploit has been launched for a crucial vulnerability chain in VMware Workstation that enables an attacker to flee from a visitor digital machine and execute arbitrary code on the host working system.

The exploit efficiently chains collectively an data leak and a stack-based buffer overflow vulnerability to realize a full guest-to-host escape, some of the extreme varieties of safety flaws in virtualization software program.

The exploit targets vulnerabilities that had been first demonstrated on the Pwn2Own Vancouver occasion in 2023. Safety researcher Alexander Zaviyalov of NCC Group just lately revealed an in depth technical evaluation and a practical PoC, demonstrating the sensible danger posed by these flaws.

The Two-Stage Assault

The guest-to-host escape is achieved by chaining two distinct vulnerabilities discovered within the digital Bluetooth gadget performance of VMware Workstation. This function, which is enabled by default, permits a visitor VM to make use of the host’s Bluetooth adapter.

Data Leak (CVE-2023-20870, CVE-2023-34044): The primary stage of the assault leverages a Use-After-Free (UAF) reminiscence leak. By sending particularly crafted USB Request Block (URB) management transfers to the digital mouse and Bluetooth units, an attacker can leak reminiscence pointers from the vmware-vmx.exe course of on the host.

This data leak is essential for bypassing Tackle Area Format Randomization (ASLR), a normal safety function that randomizes reminiscence areas to make exploitation harder.

Exploit

Buffer Overflow (CVE-2023-20869): With ASLR bypassed, the attacker proceeds to the second stage. This entails triggering a stack-based buffer overflow by sending a malicious Service Discovery Protocol (SDP) packet from the visitor VM to a different Bluetooth gadget discoverable by the host.

The overflow permits the attacker to hijack this system’s execution circulate, and with the beforehand leaked reminiscence addresses, they will execute a customized payload on the host system.

The mix of those vulnerabilities permits an attacker with management over a visitor VM to realize full management of the host machine. Within the demonstration, the exploit efficiently launched a reverse shell from a Linux visitor to a totally patched Home windows 11 host, successfully compromising the underlying system, Alexander Zaviyalov stated.

The complete exploit chain primarily impacts VMware Workstation 17.0.1 and earlier variations. The precise vulnerabilities have completely different patch timelines:

The stack-based buffer overflow (CVE-2023-20869) was addressed in model 17.0.2.vmware-workstation-guest-to-host-escape.pdf

The reminiscence leak vulnerabilities (CVE-2023-20870 and CVE-2023-34044) had been patched throughout variations 17.0.2 and 17.5.0, respectively.vmware-workstation-guest-to-host-escape.pdf

As a result of the whole exploit requires each the buffer overflow and the reminiscence leak, customers working model 17.0.1 or older are on the highest danger.

Mitigations

The first suggestion for all customers is to replace their VMware Workstation software program to the newest accessible model (17.5.0 or newer), which comprises patches for all of the mentioned vulnerabilities.

For customers who can’t instantly replace, a possible workaround is to disable the digital Bluetooth gadget. This may be completed by unchecking the “Share Bluetooth units with the digital machine” possibility within the digital machine’s USB Controller settings.

Disabling this function removes the assault floor exploited by this particular PoC. The detailed analysis highlights the complexity of recent exploits and underscores the significance of well timed patching for virtualization platforms.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Escape, Exploit, guesttohost, PoC, Released, VMware, Vulnerability, Workstation

Post navigation

Previous Post: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
Next Post: Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency

Related Posts

20,000 Malicious IPs and Domains Linked to 69 Malware Variants Dismantled Cyber Security News
Threat Actors Exploiting Expired Discord Invite Links to Deliver Multi-Stage Malware Cyber Security News
New Malware Attack Using Variable Functions and Cookies to Evade and Hide Their Malicious Scripts Cyber Security News
Microsoft Investigates Defender Portal Access Issues Following Traffic Spike Cyber Security News
New Microsoft 365 Admin Feature Let Admins Control Link Creation Policies Cyber Security News
Hackers Accessed Customer Data From Salesforce Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Leveraging OSINT Tools for Enhanced Cybersecurity Threat Intelligence
  • Data Breach at Texas Gas Station Operator Exposes Info of 377,000+ Customers
  • MuddyWater Launches RustyWater RAT via Spear-Phishing Across Middle East Sectors
  • Europol Arrests 34 Black Axe Members in Spain Over €5.9M Fraud and Organized Crime
  • New MacSync Stealer Uses Signed macOS App to Evade Gatekeeper and Steal Data

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark