First published: Tue Oct 29 2024(Updated: )
The Vagrant VMWare Utility Windows installer targeted a custom location with a non-protected path that could be modified by an unprivileged user, introducing potential for unauthorized file system writes. This vulnerability, CVE-2024-10228, was fixed in Vagrant VMWare Utility 1.0.23
Credit: security@hashicorp.com
Affected Software | Affected Version | How to fix |
---|---|---|
HashiCorp Vagrant VMware Utility for Windows | <1.0.23 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-10228 has been classified as a moderate severity vulnerability due to the potential for unauthorized file system writes.
To fix CVE-2024-10228, update to Vagrant VMWare Utility version 1.0.23 or later.
CVE-2024-10228 affects Vagrant VMWare Utility versions prior to 1.0.23 on Windows systems.
Exploitation of CVE-2024-10228 allows unprivileged users to modify installation files, potentially leading to unauthorized actions.
Yes, CVE-2024-10228 is mitigated in the release of Vagrant VMWare Utility version 1.0.23.