Skip to content

TechDirectArchive

Hands-on IT, Cloud, Security & DevOps Insights

  • Home
  • About
  • Advertise With US
  • Reviews
  • Contact
  • Toggle search form
Home » Network | Monitoring » CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability

CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability

Posted on 29/11/202204/04/2023 Christian By Christian No Comments on CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability
vmwarefrsd4

VMware Tools is a set of services and modules that enable several features in VMware products for better management of guests operating systems and seamless user interactions with them. VMware Tools has the ability to pass messages from the host operating system to the guest operating system. Here are some interesting guides: VMware Workstation states: What are the differences between Suspend, Power Off, and Run in Background, what are the differences between vSphere, ESXi, and Center, how To Deploy Azure VMware Solution Private Cloud, and how to create and delete a snapshot on VMware Workstation. Therefore, VMware Tools is a suite of utilities that enhances the performance of the virtual machine guest operating system and improves the management of the virtual machine. In this article, you will learn about the CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability.

Without VMware Tools installed in your guest operating system, guest performance lacks important functionality. Installing VMware Tools improves these issues low video resolution, inadequate color depth, incorrect display of network speed, restricted movement of the mouse, inability to copy and paste and drag and drop files, missing sound, and provides the ability to take quiesced snapshots of the guest OS, and synchronizes the time in the guest operating system with the time on the host. Here are some interesting guides: How to add Dynamic Wallpaper controlled by time on Windows 10 and 11, Protect Microsoft Defender Settings with Tamper Protection, and how to retrieve deleted WhatsApp messages on iPhone.

Impacted Product

VMware Tools for Windows

A denial-of-service vulnerability in VMware Tools for Windows was privately reported to VMware. Updates are available to remediate this vulnerability in affected VMware products. You may want to see this guide: How to create and delete a snapshot on VMware Workstation, how to install Windows Server 2022 on VMware Workstation and Initialize and format a virtual disk: How to add and remove a new virtual disk from a VM on VMware Workstation.


Issue description

VMware Tools for Windows contains a denial-of-service vulnerability in the VM3DMP driver. VMware has evaluated the severity of this issue to be in the Low Severity Range with a maximum CVSSv3 base score of 3.3.

How can this vulnerability ‘CVE-2021-31693’ be exploited?

On devices where the VMware Tools is installed, an attacker (a malicious actor) with local user privileges in the Windows guest OS can trigger a PANIC in the VM3DMP driver leading to a denial-of-service condition in the Windows guest OS.

How can this vulnerability be exploited?

This vulnerability does not have a workaround. To remediate this issue (CVE-2022-31693), please apply the patches listed in the ‘Fixed Version’ column of the ‘Response Matrix’ found below.

ProductVersionRunning OnCVE IdentifierCVSSv3SeverityFixed VersionWorkaroundsAdditional Documentation
VMware Tools for Windows12.x.y, 11.x.y and 10.x.yWindowsCVE-2022-316933.3Low 12.1.5NoneNone

I hope you found this blog post helpful on CVE-2021-31693: VMware Tools for Windows update addresses a denial-of-service vulnerability. Please let me know in the comment session if you have any questions.

Rate this post

Thank you for reading this post. Kindly share it with others.

  • Share on X (Opens in new window) X
  • Share on Reddit (Opens in new window) Reddit
  • Share on LinkedIn (Opens in new window) LinkedIn
  • Share on Facebook (Opens in new window) Facebook
  • Share on Pinterest (Opens in new window) Pinterest
  • Share on Tumblr (Opens in new window) Tumblr
  • Share on Telegram (Opens in new window) Telegram
  • Share on WhatsApp (Opens in new window) WhatsApp
  • Share on Mastodon (Opens in new window) Mastodon
  • Share on Bluesky (Opens in new window) Bluesky
  • Share on Threads (Opens in new window) Threads
  • Share on Nextdoor (Opens in new window) Nextdoor
Network | Monitoring Tags:security, VMs, VMware, VMware Workstation, vulnerability

Post navigation

Previous Post: Change Account Lockout Threshold for Local Accounts in Windows: The reference account is locked
Next Post: Force immediate MBAM Encryption: Why does the MBAM Agent delay most times in encrypting devices?

Related Posts

  • Featured image
    Domain Naming System: Enabling DNS over TLS in Windows 11 Network | Monitoring
  • Hyper V Virtual Switch Copy
    How to Create VDI Collections on Windows Server 2022 Network | Monitoring
  • Access Synology Remotely
    How to create a Tailscale VPN connection to Synology NAS Backup
  • Exchange password
    How to block the Change Password Feature for All Users via the Exchange Administrative Center Network | Monitoring
  • Hub Transport 1
    Hub Transport Server: Resolving ‘Failed to Reach Running Status’ Network | Monitoring
  • Container insights
    How to use Container Insights for Azure Kubernetes Workload Network | Monitoring

More Related Articles

Featured image Domain Naming System: Enabling DNS over TLS in Windows 11 Network | Monitoring
Hyper V Virtual Switch Copy How to Create VDI Collections on Windows Server 2022 Network | Monitoring
Access Synology Remotely How to create a Tailscale VPN connection to Synology NAS Backup
Exchange password How to block the Change Password Feature for All Users via the Exchange Administrative Center Network | Monitoring
Hub Transport 1 Hub Transport Server: Resolving ‘Failed to Reach Running Status’ Network | Monitoring
Container insights How to use Container Insights for Azure Kubernetes Workload Network | Monitoring

Leave a Reply Cancel reply

You must be logged in to post a comment.

Microsoft MVP

VEEAMLEGEND

vexpert-badge-stars-5

Virtual Background

GoogleNews

Categories

veeaam100

Veeam Vanguard

  • browser
    How to configure a new tab page URL in Microsoft Edge Windows
  • youtube cover blue
    How to use the Azure Cloud Shell or Azure CLI and Azure PowerShell AWS/Azure/OpenShift
  • Show or Hide File Extensions
    How to Show or Hide File Extensions on Windows 11 Windows
  • Prevent Local Administrators from turning off BitLocker 1
    Prevent Local Administrators from managing BitLocker with the manage-bde command Windows
  • Angular 1
    How to deploy an Angular App to AWS S3 AWS/Azure/OpenShift
  • TLS1.2
    Unable to install Azure AD Connect, TLS 1.2 is required: How to enable or disable TLS 1.2 on a Windows Server via the Registry and PowerShell AWS/Azure/OpenShift
  • Slide2 1
    How to deploy WordPress on Azure App Service AWS/Azure/OpenShift
  • How to fix Windows Update Fails with Error 0x80092004
    How to fix Windows Update Fails with Error 0x80092004 Windows

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.

Join 1,808 other subscribers
  • RSS - Posts
  • RSS - Comments
  • About
  • Authors
  • Write for us
  • Advertise with us
  • General Terms and Conditions
  • Privacy policy
  • Feedly
  • Telegram
  • Youtube
  • Facebook
  • Instagram
  • LinkedIn
  • Tumblr
  • Pinterest
  • Twitter
  • mastodon

Tags

AWS Azure Bitlocker Microsoft Windows PowerShell WDS Windows 10 Windows 11 Windows Deployment Services Windows Server 2016

Copyright © 2025 TechDirectArchive

 

Loading Comments...
 

You must be logged in to post a comment.