First published: Wed May 22 2024(Updated: )
This vulnerability allows remote attackers to execute arbitrary code on affected installations of VMware Workstation. User interaction is required to exploit this vulnerability in that the target in a guest system must visit a malicious page or open a malicious file. The ZDI has assigned a CVSS rating of 9.6. The following CVEs are assigned: CVE-2024-22268.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation and ESXi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-494 is considered high due to its potential for remote code execution.
To fix ZDI-24-494, update VMware Workstation to the latest version provided by VMware.
The potential impacts of ZDI-24-494 include unauthorized code execution on the affected system.
ZDI-24-494 affects various versions of VMware Workstation that are not updated to address this vulnerability.
Yes, user interaction is required as the target must visit a malicious page or open a malicious file for the exploit to work.