An attacker with normal user privileges may exploit this issue to trick an admin user into executing malicious code on the system where VMware Fusion is installed. VMware Fusion contains a privilege escalation vulnerability due to the way it allows configuring the system wide path. The Common Vulnerabilities and Exposures project () has assigned the identifier CVE-2020-4004 to this issue. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. VMware Fusion contains a use-after-free vulnerability in the XHCI USB controller. This release of VMware Fusion addresses the following issues: Performance improvements, bug fixes and security updates. This release of VMware Fusion is a free upgrade for all VMware Fusion 11 users. Supports only macOS 10.14 Mojave or macOS 10.15 Catalina hosts. The following are also supported with a recommended graphic card that supports Metal:Ģ010 Mac Pro Six Core, Eight Core, and Twelve Core. System RequirementsĪll Macs launched in 2012 or later are supported except for the following:Ģ012 Mac Pro Quad Core using the Intel® Xeon® W3565 Processor. VMware Fusion® 11 is the easiest, fastest, and most reliable way to run Windows and other x86 based operating systems on a Mac without rebooting.įor more information, see the broader VMware Fusion documentation. What's in the Release Notes The release notes cover the following topics:
0 Comments
Leave a Reply. |