First published: Tue May 21 2024(Updated: )
The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.
Credit: security@vmware.com
Affected Software | Affected Version | How to fix |
---|---|---|
VMware ESXi and Horizon DaaS | ||
VMware Workstation and ESXi | ||
VMware Fusion | ||
VMware vCenter Server and Cloud Foundation | >=4.0<5.1.1 | |
VMware Workstation and ESXi | >=17.0.0<17.5.1 | |
VMware ESXi and Horizon DaaS | =7.0 | |
VMware ESXi and Horizon DaaS | =7.0-beta | |
VMware ESXi and Horizon DaaS | =7.0-update_1 | |
VMware ESXi and Horizon DaaS | =7.0-update_1a | |
VMware ESXi and Horizon DaaS | =7.0-update_1b | |
VMware ESXi and Horizon DaaS | =7.0-update_1c | |
VMware ESXi and Horizon DaaS | =7.0-update_1d | |
VMware ESXi and Horizon DaaS | =7.0-update_1e | |
VMware ESXi and Horizon DaaS | =7.0-update_2 | |
VMware ESXi and Horizon DaaS | =7.0-update_2a | |
VMware ESXi and Horizon DaaS | =7.0-update_2c | |
VMware ESXi and Horizon DaaS | =7.0-update_2d | |
VMware ESXi and Horizon DaaS | =7.0-update_2e | |
VMware ESXi and Horizon DaaS | =7.0-update_3 | |
VMware ESXi and Horizon DaaS | =7.0-update_3c | |
VMware ESXi and Horizon DaaS | =7.0-update_3d | |
VMware ESXi and Horizon DaaS | =7.0-update_3e | |
VMware ESXi and Horizon DaaS | =7.0-update_3f | |
VMware ESXi and Horizon DaaS | =7.0-update_3g | |
VMware ESXi and Horizon DaaS | =7.0-update_3i | |
VMware ESXi and Horizon DaaS | =7.0-update_3j | |
VMware ESXi and Horizon DaaS | =7.0-update_3k | |
VMware ESXi and Horizon DaaS | =7.0-update_3l | |
VMware ESXi and Horizon DaaS | =7.0-update_3m | |
VMware ESXi and Horizon DaaS | =7.0-update_3n | |
VMware ESXi and Horizon DaaS | =7.0-update_3o | |
VMware ESXi and Horizon DaaS | =7.0-update_3p | |
VMware ESXi and Horizon DaaS | =8.0 | |
VMware ESXi and Horizon DaaS | =8.0-a | |
VMware ESXi and Horizon DaaS | =8.0-b | |
VMware ESXi and Horizon DaaS | =8.0-c | |
VMware ESXi and Horizon DaaS | =8.0-update_1 | |
VMware ESXi and Horizon DaaS | =8.0-update_1a | |
VMware ESXi and Horizon DaaS | =8.0-update_1c | |
VMware ESXi and Horizon DaaS | =8.0-update_2 | |
All of | ||
VMware Fusion | >=13.0.0<13.5.1 | |
macOS |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-22273 has been classified as a critical vulnerability due to the potential for remote code execution and denial of service.
To fix CVE-2024-22273, update to the latest version of VMware ESXi, Workstation, or Fusion that contains the security patch.
CVE-2024-22273 affects VMware ESXi, Workstation, and Fusion products with storage controllers enabled.
Yes, exploiting CVE-2024-22273 can create a denial of service condition on the hypervisor.
A malicious actor with access to a virtual machine with storage controllers enabled can exploit CVE-2024-22273.