CVE-2024-22253:Use-after-free vulnerability in VMware ESXi, Workstation, and Fusion

splash
Back

Description Preview

VMware ESXi, Workstation, and Fusion are affected by a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine could exploit this vulnerability to execute code as the virtual machine's VMX process running on the host. In the case of ESXi, the exploitation is contained within the VMX sandbox, while in Workstation and Fusion, it could lead to code execution on the machine where Workstation or Fusion is installed.

Overview

  • CVE ID: CVE-2024-22253
  • CVSS Score: 9.3 (Critical)
    • Attack Vector: Local
    • Attack Complexity: Low
    • Privileges Required: None
    • User Interaction: None
    • Scope: Changed
    • Confidentiality Impact: High
    • Integrity Impact: High
    • Availability Impact: High
  • Affected Products and Versions:
    • VMware ESXi 8.0 (less than ESXi80U2sb-23305545, ESXi80U1d-23299997)
    • VMware ESXi 7.0 (less than ESXi70U3p-23307199)
    • VMware Workstation 17.x (less than 17.5.1)
    • VMware Fusion 13.x (less than 13.5.1)
    • VMware Cloud Foundation 5.x, 4.x

Remediation

  • VMware has released patches to address this vulnerability. Users of affected products are advised to update to the following versions or later:
    • VMware ESXi 8.0: Upgrade to ESXi80U2sb-23305545 or later
    • VMware ESXi 7.0: Upgrade to ESXi70U3p-23307199 or later
    • VMware Workstation 17.x: Upgrade to version 17.5.1 or later
    • VMware Fusion 13.x: Upgrade to version 13.5.1 or later
    • VMware Cloud Foundation: Apply the necessary updates as per VMware's security advisory.

References

Industry ExposureMost to least
This section illustrates the prevalence of a specific Common Vulnerabilities and Exposures (CVE) across various industries based on customer reports. The ranking displays industries from the most to least affected by this particular vulnerability, offering valuable insight into where this CVE has been most frequently observed. This information can help organizations within these sectors prioritize their security efforts, understand their relative risk exposure compared to their peers, and focus remediation strategies where they are most needed. By understanding the industry-specific impact, organizations can make more informed decisions regarding patching, resource allocation, and overall risk management related to this CVE.

  1. Manufacturing
    Manufacturing
  2. Health Care & Social Assistance
    Health Care & Social Assistance
  3. Public Administration
    Public Administration
  4. Professional, Scientific, & Technical Services
    Professional, Scientific, & Technical Services
  5. Finance and Insurance
    Finance and Insurance
  6. Educational Services
    Educational Services
  7. Transportation & Warehousing
    Transportation & Warehousing
  8. Retail Trade
    Retail Trade
  9. Other Services (except Public Administration)
    Other Services (except Public Administration)
  10. Arts, Entertainment & Recreation
    Arts, Entertainment & Recreation
  11. Management of Companies & Enterprises
    Management of Companies & Enterprises
  12. Utilities
    Utilities
  13. Information
    Information
  14. Accommodation & Food Services
    Accommodation & Food Services
  15. Agriculture, Forestry Fishing & Hunting
    Agriculture, Forestry Fishing & Hunting
  16. Mining
    Mining
  17. Real Estate Rental & Leasing
    Real Estate Rental & Leasing
  18. Wholesale Trade
    Wholesale Trade
  19. Administrative, Support, Waste Management & Remediation Services
    Administrative, Support, Waste Management & Remediation Services
  20. Construction
    Construction

Focus on What Matters

  1. See Everything.
  2. Identify True Risk.
  3. Proactively Mitigate Threats.

Let's talk!

background