Vulnerabilities in VMware software expose it to remote execution of code by threat actors due to critical defects.
These are found in different parts of the virtualization platform, management interfaces, and other related tools, making the flaw latent.
This can enable them to gain higher access levels, thereby running malicious codes from afar on computers affected through successful exploitation.
Multiple vulnerabilities were privately reported to VMware recently in VMware ESXi, Workstation, and Fusion.
As a result, VMware patched the critical flaws in ESXi, Workstation, and Fusion after private disclosure. Combining multiple important vulnerabilities escalates severity.
Malware analysis can be fast and simple. Just let us show you the way to:
Here below, we have mentioned all the vulnerabilities:-
Here below, we have mentioned all the products that are impacted:-
The vulnerability (CVE-2024-22252) allows code execution from VM in VMware products.
While the VMware XHCI USB flaw (CVE-2024-22253) is critical for Workstation/Fusion, but important for ESXi.
UHCI USB bug also impacts VMware products as well and enables code execution. Out-of-bounds write flaw (CVE-2024-22254) in ESXi risks VMX sandbox escape.
Memory leak possible via UHCI USB flaw (CVE-2024-22255) across VMware lineup.
Broadcom released critical patches for severe vulnerabilities in ESXi 6.7, 6.5, and VCF 3.x. Additional patches are available for ESXi 8.0 U1.
If not updating to ESXi 8.0 Update 2b, use 8.0 Update 1d for security fixes.
With Perimeter81 malware protection, you can block malware, including Trojans, ransomware, spyware, rootkits, worms, and zero-day exploits. All are incredibly harmful and can wreak havoc on your network.
Stay updated on Cybersecurity news, Whitepapers, and Infographics. Follow us on LinkedIn & Twitter.
A critical security vulnerability has been discovered in Google Chrome, prompting an urgent update as…
Law enforcement authorities across Europe and Türkiye have dealt a major blow to four criminal…
Microsoft Teams users across the globe are experiencing significant disruptions in file-sharing capabilities due to…
Cloud computing has transformed the way organizations operate, offering unprecedented scalability, flexibility, and cost savings.…
Security awareness has become a critical component of organizational defense strategies, particularly as companies adopt…
Security researchers have unveiled a new malware process injection technique dubbed "Waiting Thread Hijacking" (WTH),…