First published: Tue May 14 2024(Updated: )
VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation | ||
VMware Fusion Pro |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22267 is considered a critical vulnerability due to its potential for local administrative exploitation on VMware Workstation and Fusion.
To fix CVE-2024-22267, ensure that you update your VMware Workstation or Fusion to the latest patched version provided by VMware.
CVE-2024-22267 is a use-after-free vulnerability specifically affecting the vbluetooth device in VMware products.
Only a malicious actor with local administrative privileges on the virtual machine can exploit CVE-2024-22267.
If exploited, CVE-2024-22267 could allow an attacker to execute arbitrary code within the VMX process on the host system.