iTnews Asia
  • Home
  • News
  • Security

VMware patches against sandbox escape

VMware patches against sandbox escape

Critical vulnerabilities in Workstation and Fusion software.

By Richard Chirgwin on Mar 8, 2024 11:04AM

VMware has issued a patch for two critical vulnerabilities in its Fusion and Workstation software.

The company’s advisory said the vulnerabilities also affect its ESXi systems to a lesser degree, rated there as high severity.

The first vulnerability, CVE-2024-22252, is a use-after-free memory bug in the extensible host controller (XHCI) USB controller.

A malicious attacker with local admin privileges on a VM can execute code as the VMX process on the host. On the Workstation and Fusion products, it can lead to code execution, but on ESXi it’s contained within the VMX sandbox.

CVE-2024-22253 is also a use-after-free, this time in the universal host controller interface (UHCI) USB controller, providing the same attack paths as CVE-2024-22252.

These two bugs were discovered by attack teams taking part in the 2023 Tianfu Cup cyber security contest.

A third vulnerability, CVE-2024-22254, is an out-of-bounds write affecting only ESXi and rated of moderate severity.

Finally, CVE-2024-22255 (also moderate severity) is an information disclosure vulnerability in the UHCI USB controller in ESXi, Fusion, and Workstation.

“A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox”, the advisory stated.

In an FAQ, VMware explained that while patching is the quickest way to resolve the issues, users could also mitigate issues by removing USB controllers from virtual machines.

VMware also said the bug affects out-of-support vSphere 6.x software.

To reach the editorial team on your feedback, story ideas and pitches, contact them here.
Copyright © iTnews.com.au . All rights reserved.
Tags:
security vmware

Related Articles

  • Proofpoint CEO: A tool-based approach for cybersecurity is impractical
  • Akamai: AI-security is both a security imperative and an economic necessity
  • The real-life Tom & Jerry chase
  • How can we bolster our resilience against AI-enabled e-mail attacks?
Share on Twitter Share on Facebook Share on LinkedIn Share on Whatsapp Email A Friend

Most Read Articles

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

Proofpoint CEO: A tool-based approach for cybersecurity is impractical

The real-life Tom & Jerry chase

The real-life Tom & Jerry chase

How can we bolster our resilience against AI-enabled e-mail attacks?

How can we bolster our resilience against AI-enabled e-mail attacks?

Akamai: AI-security is both a security imperative and an economic necessity

Akamai: AI-security is both a security imperative and an economic necessity

All rights reserved. This material may not be published, broadcast, rewritten or redistributed in any form without prior authorisation.
Your use of this website constitutes acceptance of Lighthouse Independent Media's Privacy Policy and Terms & Conditions.