VMware Patches Critical Security Vulnerabilities

, VMware Security Patch

In a critical move to bolster cybersecurity, VMware has patched multiple security vulnerabilities across an array of its products. Two critical bugs, CVE-2024-22252 and CVE-2024-22253, have commanded particular attention. These use-after-free issues in the XHCI USB controller bear high-severity scores—9.3 for Workstation and Fusion, and 8.4 for ESXi systems.

A malicious actor with local administrative privileges on a virtual machine could exploit these vulnerabilities. Their nefarious actions would affect the virtual machine’s VMX process. Specifically, they could facilitate code execution on the VMX sandbox on ESXi, and more alarmingly, even target the host machine for Workstation and Fusion users. Security researchers from Ant Group Light-Year Security Lab, QiAnXin, VictorV, and Wei have received acknowledgments for their diligent effort in discovering these flaws.

As an immediate measure, VMware advises customers to detach USB controllers from virtual machines—this acts as a temporary bulwark against potential exploits. However, they emphasize the urgency of deploying the patches as a more permanent solution. This will rectify not only the high-profile vulnerabilities but also address an out-of-bounds write issue and a significant information disclosure vulnerability concerning the UHCI USB controller.

At this juncture, vigilance is essential. Users who overlook the implementation of these patches risk exposure to malicious activities. Such exploitation could culminate in code execution and memory leaks, which compromise both data integrity and privacy.

This release signifies VMware’s continuous fight against cyber threats. They have exhibited commendable transparency in their collaboration, working in tandem with the cybersecurity community to identify and neutralize threats. Applying these updates will serve as a vital shield, hardening the defenses that keep our digital ecosystems secure. For the greater good of cybersecurity health, VMware customers must act swiftly, following the company’s guidance to fortify their systems against these insidious risks.

If you enjoyed this article, please check out our other articles on CyberNow

March 10, 2024
VMware has issued patches for critical bugs in its products, advising immediate action from its customers to secure their systems against potential exploits.