Broadcom has issued a security advisory addressing three critical zero-day vulnerabilities in multiple VMware products, including VMware ESXi, Workstation, and Fusion. The Microsoft Threat Intelligence Center (MSTIC) discovered these vulnerabilities and found them exploited in the wild. Organizations using the affected VMware products are strongly advised to apply the available patches immediately to mitigate the risks associated with these flaws.
The identified vulnerabilities, tracked as CVE-2024-22224, CVE-2024-22225, and CVE-2024-22226, could allow attackers with administrative privileges to execute malicious code, escape sandbox environments, and leak sensitive information from memory. The severity of these vulnerabilities ranges from 7.1 to 9.3 on the CVSSv3 scale, making them critical concerns for organizations relying on VMware infrastructure.
1. CVE-2024-22224: VMware ESXi and Workstation Heap-Overflow Vulnerability
2. CVE-2024-22225: VMware ESXi Arbitrary Write Vulnerability
3. CVE-2024-22226: VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability
Broadcom has confirmed that these vulnerabilities have been exploited in real-world attacks. However, no technical details or proof-of-concept (PoC) exploits have been publicly disclosed. Organizations should assume active exploitation and prioritize patching accordingly.
VMware has released security patches for affected products. Organizations should update to the fixed versions listed below:
Affected Product | CVE(s) | Fixed Version |
VMware ESXi 8.0 | CVE-2024-22224, CVE-2024-22225, CVE-2024-22226 | ESXi80U3d-24585383, ESXi80U2d-24585300 |
VMware ESXi 7.0 | CVE-2024-22224, CVE-2024-22225, CVE-2024-22226 | ESXi70U3s-24585291 |
VMware ESXi 6.7 | CVE-2024-22224, CVE-2024-22225, CVE-2024-22226 | ESXi670-202403001 |
VMware Workstation 17.x | CVE-2024-22224, CVE-2024-22226 | 17.6.3 |
VMware Fusion 13.x | CVE-2024-22226 | 13.6.3 |
Additionally, VMware Cloud Foundation and VMware Telco Cloud Platform are affected. An asynchronous patch is available for VMware Cloud Foundation, while Telco Cloud Platform customers should update to a fixed ESXi version. Broadcom’s advisory provides further details.
To minimize risks associated with these vulnerabilities, organizations should take the following actions:
The discovery of these zero-day vulnerabilities in VMware ESXi, Workstation, and Fusion emphasizes the need for timely patching and proactive security measures. Since these flaws are being actively exploited in the wild, organizations should prioritize updates and strengthen their security posture.
Following VMware’s guidance and adopting cybersecurity practices will help mitigate potential risks associated with these vulnerabilities.
Disclaimer: This blog is based on our research and the information available at the time of writing. It is for informational purposes only and does not constitute legal, financial, or professional advice. While we strive for accuracy, we do not guarantee the completeness or reliability of the content. If any sensitive information has been inadvertently included, please contact us for correction. Cyble is not responsible for any errors, omissions, or decisions made based on this content. Readers should verify findings and seek expert advice where necessary. All trademarks, logos, and third-party content belong to their respective owners and do not imply endorsement or affiliation. All content is presented “as is” without any guarantee that it is free of confidential, proprietary, or otherwise sensitive information. If you believe any portion of this content contains inadvertently shared or sensitive data, please contact us immediately so that we may address and rectify the issue. No Liability for Errors or Omissions Due to the dynamic nature of cyber threat activity, this [blog/report/article] may include partial, outdated, or otherwise incorrect information due to unverified sources, evolving security threats, or human error. We expressly disclaim any liability for errors or omissions or any potential consequences arising from the use, misuse, or reliance on this information.