Bug 2236542 (CVE-2023-20900) - CVE-2023-20900 open-vm-tools: SAML token signature bypass
Summary: CVE-2023-20900 open-vm-tools: SAML token signature bypass
Keywords:
Status: NEW
Alias: CVE-2023-20900
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
high
high
Target Milestone: ---
Assignee: Product Security
QA Contact:
URL:
Whiteboard:
Depends On: 2236543 2236544 2236578 2236579 2236580 2236581 2236582 2236583
Blocks: 2236541
TreeView+ depends on / blocked
 
Reported: 2023-08-31 16:59 UTC by Chess Hazlett
Modified: 2024-07-15 09:18 UTC (History)
30 users (show)

Fixed In Version:
Doc Type: If docs needed, set a value
Doc Text:
An improper signature verification flaw was found in open-vm-tools that may lead to a bypass of SAML token signature. A malicious actor that has been granted Guest Operation Privileges in a target virtual machine may be able to elevate their privileges if that target virtual machine has been assigned a more privileged Guest Alias.
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)


Links
System ID Private Priority Status Summary Last Updated
Red Hat Product Errata RHSA-2023:5210 0 None None None 2023-09-19 07:38:58 UTC
Red Hat Product Errata RHSA-2023:5213 0 None None None 2023-09-19 07:38:40 UTC
Red Hat Product Errata RHSA-2023:5216 0 None None None 2023-09-19 07:58:21 UTC
Red Hat Product Errata RHSA-2023:5217 0 None None None 2023-09-19 08:00:28 UTC
Red Hat Product Errata RHSA-2023:5218 0 None None None 2023-09-19 08:01:14 UTC
Red Hat Product Errata RHSA-2023:5220 0 None None None 2023-09-19 07:58:31 UTC
Red Hat Product Errata RHSA-2023:5312 0 None None None 2023-09-20 13:42:27 UTC
Red Hat Product Errata RHSA-2023:5313 0 None None None 2023-09-20 13:42:32 UTC

Description Chess Hazlett 2023-08-31 16:59:36 UTC
VMware Tools contains a SAML token signature bypass vulnerability. A malicious actor with man-in-the-middle (MITM) network positioning between vCenter server and the virtual machine may be able to bypass SAML token signature verification, to perform VMware Tools Guest Operations.

References:

https://www.vmware.com/security/advisories/VMSA-2023-0019.html
https://www.openwall.com/lists/oss-security/2023/08/31/1
https://github.com/vmware/open-vm-tools/blob/CVE-2023-20900.patch/CVE-2023-20900.patch

Comment 2 Pedro Sampaio 2023-08-31 19:56:42 UTC
Created open-vm-tools tracking bugs for this issue:

Affects: fedora-all [bug 2236578]

Comment 20 errata-xmlrpc 2023-09-19 07:38:36 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.1 Update Services for SAP Solutions

Via RHSA-2023:5213 https://access.redhat.com/errata/RHSA-2023:5213

Comment 21 errata-xmlrpc 2023-09-19 07:38:55 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.2 Advanced Update Support
  Red Hat Enterprise Linux 8.2 Update Services for SAP Solutions
  Red Hat Enterprise Linux 8.2 Telecommunications Update Service

Via RHSA-2023:5210 https://access.redhat.com/errata/RHSA-2023:5210

Comment 22 errata-xmlrpc 2023-09-19 07:58:17 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.4 Advanced Mission Critical Update Support
  Red Hat Enterprise Linux 8.4 Telecommunications Update Service
  Red Hat Enterprise Linux 8.4 Update Services for SAP Solutions

Via RHSA-2023:5216 https://access.redhat.com/errata/RHSA-2023:5216

Comment 23 errata-xmlrpc 2023-09-19 07:58:28 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8.6 Extended Update Support

Via RHSA-2023:5220 https://access.redhat.com/errata/RHSA-2023:5220

Comment 24 errata-xmlrpc 2023-09-19 08:00:25 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 7

Via RHSA-2023:5217 https://access.redhat.com/errata/RHSA-2023:5217

Comment 25 errata-xmlrpc 2023-09-19 08:01:11 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9.0 Extended Update Support

Via RHSA-2023:5218 https://access.redhat.com/errata/RHSA-2023:5218

Comment 26 errata-xmlrpc 2023-09-20 13:42:24 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 8

Via RHSA-2023:5312 https://access.redhat.com/errata/RHSA-2023:5312

Comment 27 errata-xmlrpc 2023-09-20 13:42:26 UTC
This issue has been addressed in the following products:

  Red Hat Enterprise Linux 9

Via RHSA-2023:5313 https://access.redhat.com/errata/RHSA-2023:5313


Note You need to log in before you can comment on or make changes to this bug.