First published: Thu May 30 2024(Updated: )
This vulnerability allows local attackers to escalate privileges on affected installations of VMware Workstation. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 8.2. The following CVEs are assigned: CVE-2024-22267.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation and ESXi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
ZDI-24-526 has a high severity level due to its potential for privilege escalation.
To fix ZDI-24-526, you should apply the latest security updates provided by VMware for Workstation.
ZDI-24-526 affects installations of VMware Workstation on guest systems where high-privileged code execution is possible.
No, ZDI-24-526 requires local access to exploit, making remote exploitation not feasible.
Exploiting ZDI-24-526 allows local attackers to escalate their privileges, potentially compromising system security.