VMware Tools updates address a SAML Token Signature Bypass Vulnerability (CVE-2023-20900)
VMware released security advisory VMSA-2023-0019 with Low severity affecting VMware Tools for Windows and Linux.
The fix is available in VMware Tools v12.3.0
for Windows available in the VSS-Windows Content Library as Item VMware-Tools-windows-12.3.0-22234872
(see Windows section below) and Linux via open-vm-tools
package or patch (see Linux section below).
How-To Remediate
Windows
ITS Private Cloud CLI
Mount the VMware Tools ISO
VMware-Tools-windows-12.3.0-22234872
with thevss-cli
:vss-cli compute vm set <id> cd up --backing VMware-Tools-windows-12.3.0-22234872 1
Proceed with the installation in the OS.
ITS Private Cloud Portal
Login to the
https://cloud-portal.eis.utoronto.ca
Look for your VM and click on the
Edit
button.Mount the VMWare Tools ISO
VMware-Tools-windows-12.3.0-2223487
.Proceed with the installation in the OS.
Linux
A new
open-vm-tools
version is available at https://github.com/vmware/open-vm-tools/releases/tag/stable-12.3.0.A patch for existing open-vm-tools releases is provided in the CVE-2023-20900 README file.
Ubuntu, Debian and related OS
You can update the open-vm-tools package with the following command:
sudo apt update && sudo apt install --only-upgrade open-vm-tools
RedHat, Fedora, CentOS and related
You can update the open-vm-tools package with the following command:
Red Hat 7 / Fedora / CentOS 7
sudo yum update open-vm-tools
Red Hat 8 and 9
sudo dnf update open-vm-tools
References
Related content
University of Toronto - Since 1827