First published: Fri May 31 2024(Updated: )
This vulnerability allows local attackers to disclose sensitive information on affected installations of VMware Workstation. An attacker must first obtain the ability to execute high-privileged code on the target guest system in order to exploit this vulnerability. The ZDI has assigned a CVSS rating of 6.0. The following CVEs are assigned: CVE-2024-22269.
Affected Software | Affected Version | How to fix |
---|---|---|
VMware Workstation and ESXi |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of ZDI-24-529 is classified as medium due to the potential for local attackers to disclose sensitive information.
To fix ZDI-24-529, ensure that you apply the latest patches or updates provided by VMware for the affected versions of Workstation.
The ZDI-24-529 vulnerability is caused by improper access control that allows local attackers to execute high-privileged code to gain sensitive information.
Users of VMware Workstation who have not updated to the latest security patches are affected by ZDI-24-529.
No, ZDI-24-529 requires an attacker to have local access to the target guest system to exploit the vulnerability.