VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2024-0006.html | Vendor Advisory |
https://www.vmware.com/security/advisories/VMSA-2024-0006.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
07 May 2025, 15:35
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vmware.com/security/advisories/VMSA-2024-0006.html - Vendor Advisory | |
CPE | cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* |
|
First Time |
Apple
Vmware esxi Vmware Vmware fusion Apple macos Vmware cloud Foundation Vmware workstation |
Information
Published : 2024-03-05 18:15
Updated : 2025-05-07 15:35
NVD link : CVE-2024-22253
Mitre link : CVE-2024-22253
CVE.ORG link : CVE-2024-22253
JSON object : View
Products Affected
apple
- macos
vmware
- cloud_foundation
- fusion
- esxi
- workstation
CWE
CWE-416
Use After Free