Skip to content
  • Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form
PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

PoC exploit Released for VMware Workstation guest-to-host escape Vulnerability

Posted on October 2, 2025October 2, 2025 By CWS

A proof-of-concept (PoC) exploit has been launched for a crucial vulnerability chain in VMware Workstation that enables an attacker to flee from a visitor digital machine and execute arbitrary code on the host working system.

The exploit efficiently chains collectively an data leak and a stack-based buffer overflow vulnerability to realize a full guest-to-host escape, some of the extreme varieties of safety flaws in virtualization software program.

The exploit targets vulnerabilities that had been first demonstrated on the Pwn2Own Vancouver occasion in 2023. Safety researcher Alexander Zaviyalov of NCC Group just lately revealed an in depth technical evaluation and a practical PoC, demonstrating the sensible danger posed by these flaws.

The Two-Stage Assault

The guest-to-host escape is achieved by chaining two distinct vulnerabilities discovered within the digital Bluetooth gadget performance of VMware Workstation. This function, which is enabled by default, permits a visitor VM to make use of the host’s Bluetooth adapter.

Data Leak (CVE-2023-20870, CVE-2023-34044): The primary stage of the assault leverages a Use-After-Free (UAF) reminiscence leak. By sending particularly crafted USB Request Block (URB) management transfers to the digital mouse and Bluetooth units, an attacker can leak reminiscence pointers from the vmware-vmx.exe course of on the host.

This data leak is essential for bypassing Tackle Area Format Randomization (ASLR), a normal safety function that randomizes reminiscence areas to make exploitation harder.

Exploit

Buffer Overflow (CVE-2023-20869): With ASLR bypassed, the attacker proceeds to the second stage. This entails triggering a stack-based buffer overflow by sending a malicious Service Discovery Protocol (SDP) packet from the visitor VM to a different Bluetooth gadget discoverable by the host.

The overflow permits the attacker to hijack this system’s execution circulate, and with the beforehand leaked reminiscence addresses, they will execute a customized payload on the host system.

The mix of those vulnerabilities permits an attacker with management over a visitor VM to realize full management of the host machine. Within the demonstration, the exploit efficiently launched a reverse shell from a Linux visitor to a totally patched Home windows 11 host, successfully compromising the underlying system, Alexander Zaviyalov stated.

The complete exploit chain primarily impacts VMware Workstation 17.0.1 and earlier variations. The precise vulnerabilities have completely different patch timelines:

The stack-based buffer overflow (CVE-2023-20869) was addressed in model 17.0.2.vmware-workstation-guest-to-host-escape.pdf

The reminiscence leak vulnerabilities (CVE-2023-20870 and CVE-2023-34044) had been patched throughout variations 17.0.2 and 17.5.0, respectively.vmware-workstation-guest-to-host-escape.pdf

As a result of the whole exploit requires each the buffer overflow and the reminiscence leak, customers working model 17.0.1 or older are on the highest danger.

Mitigations

The first suggestion for all customers is to replace their VMware Workstation software program to the newest accessible model (17.5.0 or newer), which comprises patches for all of the mentioned vulnerabilities.

For customers who can’t instantly replace, a possible workaround is to disable the digital Bluetooth gadget. This may be completed by unchecking the “Share Bluetooth units with the digital machine” possibility within the digital machine’s USB Controller settings.

Disabling this function removes the assault floor exploited by this particular PoC. The detailed analysis highlights the complexity of recent exploits and underscores the significance of well timed patching for virtualization platforms.

Comply with us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to function your tales.

Cyber Security News Tags:Escape, Exploit, guesttohost, PoC, Released, VMware, Vulnerability, Workstation

Post navigation

Previous Post: Malicious PyPI Package soopsocks Infects 2,653 Systems Before Takedown
Next Post: Many Attacks Aimed at EU Targeted OT, Says Cybersecurity Agency

Related Posts

New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users New AiTM Attack Campaign That Bypasses MFA Targeting Microsoft 365 and Okta Users Cyber Security News
What 2025 Taught Us About Modern Malware What 2025 Taught Us About Modern Malware Cyber Security News
Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Open-Source Tool for Salesforce Aura Framework Misconfiguration Analysis Cyber Security News
New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment New Persistence Technique Allows Attackers to Hide Malware Within AWS Cloud Environment Cyber Security News
Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cisco Secure Firewall Snort 3 Detection Engine Vulnerability Enables DoS Attacks Cyber Security News
North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets North Korean Threat Actors Reveal Their Tactics in Replacing Infrastructure With New Assets Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • March 2026
  • February 2026
  • January 2026
  • December 2025
  • November 2025
  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Top Log Monitoring Tools to Watch in 2026
  • Top Spam Filter Tools for 2026: A Comprehensive Guide
  • Top Fraud Detection Tools for 2026
  • Microsoft Urges Action on Critical Windows Updates
  • Citrix NetScaler Threat: Immediate Action Required

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Copyright © 2026 Cyber Web Spider Blog – News.

Powered by PressBook Masonry Dark