VMware has published a security advisory to address use-after-free vulnerability in vmnetdhcp, improper file permissions in Cortado Thinprint, and improper protection for the configuration files of the VMware USB arbitration service.
Successful exploitation of the vulnerabilities could allow an attacker to execute arbitrary code or commands on the host machine from a guest virtual machine, elevate the privileges of a local non-administrative account to root on a guest virtual machine, or allow an attacker to create a denial-of-service condition on the host machine.
The product vendor has released new versions to address the issues at the vendor's website:
System administrators of affected systems should follow the recommendations provided by the product vendor and take immediate actions to mitigate the risk.
https://www.vmware.com/security/advisories/VMSA-2020-0004.html
https://www.hkcert.org/my_url/en/alert/20031602
https://www.us-cert.gov/ncas/current-activity/2020/03/16/vmware-releases-security-updates-multiple-products
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5543
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3947
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-3948