### [CVE-2019-5516](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-5516) ![](https://img.shields.io/static/v1?label=Product&message=ESXi&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Fusion&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=Workstation&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Vertex%20shader%20out-of-bounds%20read%20vulnerability&color=brighgreen) ### Description VMware ESXi (6.7 before ESXi670-201904101-SG and 6.5 before ESXi650-201903001), Workstation (15.x before 15.0.3 and 14.x before 14.1.6), Fusion (11.x before 11.0.3 and 10.x before 10.1.6) updates address an out-of-bounds vulnerability with the vertex shader functionality. Exploitation of this issue requires an attacker to have access to a virtual machine with 3D graphics enabled. Successful exploitation of this issue may lead to information disclosure or may allow attackers with normal user privileges to create a denial-of-service condition on their own VM. The workaround for this issue involves disabling the 3D-acceleration feature. This feature is not enabled by default on ESXi and is enabled by default on Workstation and Fusion. ### POC #### Reference No PoCs from references. #### Github - https://github.com/alphaSeclab/sec-daily-2019