VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.
References
Link | Resource |
---|---|
https://www.vmware.com/security/advisories/VMSA-2024-0006.html | Vendor Advisory |
https://www.vmware.com/security/advisories/VMSA-2024-0006.html | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
History
07 May 2025, 15:35
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:* cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0.0:b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:* |
|
First Time |
Apple macos
Vmware workstation Vmware cloud Foundation Apple Vmware esxi Vmware Vmware fusion |
|
References | () https://www.vmware.com/security/advisories/VMSA-2024-0006.html - Vendor Advisory |
21 Nov 2024, 08:55
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.vmware.com/security/advisories/VMSA-2024-0006.html - |
16 Aug 2024, 20:35
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-416 |
05 Mar 2024, 18:50
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2024-03-05 18:15
Updated : 2025-05-07 15:35
NVD link : CVE-2024-22253
Mitre link : CVE-2024-22253
CVE.ORG link : CVE-2024-22253
JSON object : View
Products Affected
vmware
- workstation
- fusion
- esxi
- cloud_foundation
apple
- macos
CWE
CWE-416
Use After Free