VMware Patches Extreme Safety Flaws in Workstation and Fusion Merchandise

Could 14, 2024NewsroomBluetooth / Vulnerability

A number of safety flaws have been disclosed in VMware Workstation and Fusion merchandise that might be exploited by menace actors to entry delicate info, set off a denial-of-service (DoS) situation, and execute code underneath sure circumstances.

The 4 vulnerabilities impression Workstation variations 17.x and Fusion variations 13.x, with fixes obtainable in model 17.5.2 and 13.5.2, respectively, the Broadcom-owned virtualization providers supplier mentioned.

Cybersecurity

A short description of every of the issues is under –

  • CVE-2024-22267 (CVSS rating: 9.3) – A use-after-free vulnerability within the Bluetooth machine that might be exploited by a malicious actor with native administrative privileges on a digital machine to execute code because the digital machine’s VMX course of operating on the host
  • CVE-2024-22268 (CVSS rating: 7.1) – A heap buffer-overflow vulnerability within the Shader performance that might be exploited by a malicious actor with non-administrative entry to a digital machine with 3D graphics enabled to create a DoS situation
  • CVE-2024-22269 (CVSS rating: 7.1) – An info disclosure vulnerability within the Bluetooth machine that might be exploited by a malicious actor with native administrative privileges on a digital machine to learn privileged info contained in hypervisor reminiscence from a digital machine
  • CVE-2024-22270 (CVSS rating: 7.1) – An info disclosure vulnerability within the Host Visitor File Sharing (HGFS) performance that might be exploited by a malicious actor with native administrative privileges on a digital machine to learn privileged info contained in hypervisor reminiscence from a digital machine

As non permanent workarounds till the patches may be deployed, customers are suggested to flip off the Bluetooth help on the digital machine and disable 3D acceleration function. There are not any mitigations that tackle CVE-2024-22270 aside from updating to the most recent model.

Cybersecurity

It is value noting that CVE-2024-22267, CVE-2024-22269, and CVE-2024-22270 have been initially demonstrated by STAR Labs SG and Theori on the Pwn2Own hacking contest held in Vancouver earlier this March.

The advisory comes greater than two months after the corporate launched patches to deal with 4 safety flaws impacting ESXi, Workstation, and Fusion, together with two crucial flaws (CVE-2024-22252 and CVE-2024-22253, CVSS scores: 9.3/8.4)that would result in code execution.

Discovered this text fascinating? Comply with us on Twitter and LinkedIn to learn extra unique content material we submit.

Recent articles

Google: 70% of exploited flaws disclosed in 2023 have been zero-days

Mandiant safety analysts warn of a worrying new pattern...

10 Greatest Challenge Portfolio Administration (PPM) Software program for 2024

Challenge portfolio administration (PPM) assists managers in figuring out...

SolarWinds Net Assist Desk flaw is now exploited in assaults

CISA has added three flaws to its 'Recognized Exploited...

North Korean Hackers Deploy Linux FASTCash Malware for ATM Cashouts

North Korean hackers goal Linux-based cost switches with new...