First published: Tue Mar 05 2024(Updated: )
VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi and Horizon DaaS | ||
VMware Workstation and ESXi | ||
VMware Fusion | ||
VMware vCenter Server and Cloud Foundation | >=4.0<=5.0 | |
VMware Workstation and ESXi | >=17.0.0<17.5.1 | |
VMware ESXi and Horizon DaaS | =7.0 | |
VMware ESXi and Horizon DaaS | =7.0-update_1 | |
VMware ESXi and Horizon DaaS | =7.0-update_1a | |
VMware ESXi and Horizon DaaS | =7.0-update_1b | |
VMware ESXi and Horizon DaaS | =7.0-update_1c | |
VMware ESXi and Horizon DaaS | =7.0-update_1d | |
VMware ESXi and Horizon DaaS | =7.0-update_1e | |
VMware ESXi and Horizon DaaS | =7.0-update_2 | |
VMware ESXi and Horizon DaaS | =7.0-update_2a | |
VMware ESXi and Horizon DaaS | =7.0-update_2c | |
VMware ESXi and Horizon DaaS | =7.0-update_2d | |
VMware ESXi and Horizon DaaS | =7.0-update_2e | |
VMware ESXi and Horizon DaaS | =7.0-update_3 | |
VMware ESXi and Horizon DaaS | =7.0-update_3c | |
VMware ESXi and Horizon DaaS | =7.0-update_3d | |
VMware ESXi and Horizon DaaS | =7.0-update_3e | |
VMware ESXi and Horizon DaaS | =7.0-update_3f | |
VMware ESXi and Horizon DaaS | =7.0-update_3g | |
VMware ESXi and Horizon DaaS | =7.0-update_3i | |
VMware ESXi and Horizon DaaS | =7.0-update_3j | |
VMware ESXi and Horizon DaaS | =7.0-update_3k | |
VMware ESXi and Horizon DaaS | =7.0-update_3l | |
VMware ESXi and Horizon DaaS | =7.0-update_3m | |
VMware ESXi and Horizon DaaS | =7.0-update_3n | |
VMware ESXi and Horizon DaaS | =7.0-update_3o | |
VMware ESXi and Horizon DaaS | =7.0.0-b | |
VMware ESXi and Horizon DaaS | =8.0 | |
VMware ESXi and Horizon DaaS | =8.0-a | |
VMware ESXi and Horizon DaaS | =8.0-b | |
VMware ESXi and Horizon DaaS | =8.0-c | |
VMware ESXi and Horizon DaaS | =8.0-update_1 | |
VMware ESXi and Horizon DaaS | =8.0-update_1a | |
VMware ESXi and Horizon DaaS | =8.0-update_1c | |
VMware ESXi and Horizon DaaS | =8.0-update_2 | |
All of | ||
VMware Fusion | >=13.0.0<13.5.1 | |
macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2024-22255 has been classified as a critical severity vulnerability due to its potential for information disclosure.
To mitigate CVE-2024-22255, ensure that you update VMware ESXi, Workstation, and Fusion to the latest patched versions provided by VMware.
CVE-2024-22255 affects users of VMware ESXi, Workstation, and Fusion who allow administrative access to virtual machines.
CVE-2024-22255 is an information disclosure vulnerability that can be exploited to leak sensitive memory data from the vmx process.
If you suspect exploitation of CVE-2024-22255, immediately assess your environment for unauthorized access and update your VMware products without delay.