VMware has disclosed multiple severe security flaws in its Workstation and Fusion products, urging users to update to versions 17.5.2 and 13.5.2 respectively to mitigate these vulnerabilities. The identified flaws include CVE-2024-22267, a critical use-after-free vulnerability in the Bluetooth device with a CVSS score of 9.3, which could enable a malicious actor with local administrative privileges on a virtual machine to execute code on the host. Other vulnerabilities include CVE-2024-22268, a heap buffer-overflow in the Shader functionality that could cause a denial-of-service (DoS) condition, and CVE-2024-22269 and CVE-2024-22270, both information disclosure vulnerabilities in the Bluetooth device and Host Guest File Sharing (HGFS) functionality, respectively.
The exploitation of these vulnerabilities could lead to significant security breaches, including unauthorized access to sensitive information and potential system compromises. Notably, CVE-2024-22267, CVE-2024-22269, and CVE-2024-22270 were demonstrated at the Pwn2Own hacking contest by STAR Labs SG and Theori. As temporary measures, VMware recommends disabling Bluetooth support and 3D acceleration on virtual machines until the patches are applied, though CVE-2024-22270 has no mitigation other than updating to the latest version.
This advisory follows VMware’s recent release of patches for other critical vulnerabilities affecting ESXi, Workstation, and Fusion, further highlighting the urgency for users to maintain up-to-date security practices. The ongoing discovery and patching of such vulnerabilities underscore the critical importance of timely updates to safeguard against potential exploits and maintain system integrity.
Reference: