Malware & Threats

VMware Patches Critical ESXi Sandbox Escape Flaws

The most serious flaws allow hackers with local admin rights to execute code as the virtual machine’s VMX process running on the host.

VMware vulnerability

Virtualization technology vendor VMware on Tuesday rolled out urgent patches for critical-severity flaws in the enterprise-facing ESXi, Workstation, Fusion and Cloud Foundation products.

The company documented four vulnerabilities and warned that the most serious bugs could allow a malicious actor with local admin privileges on a virtual machine to execute code as the virtual machine’s VMX process running on the host.

Two of the four bugs carry a CVSS severity score of 9.3 out of 10 and, because of the increased risk to organizations, VMware is pushing out fixes even for some end-of-life products.

VMware described the issues as a pair of use-after-free memory corruption vulnerabilities in the XHCI USB controller (CVE-2024-22252 and CVE-2024-22253) that can be combined to escape sandbox mitigations.

“On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed,” VMware warned

VMware also acknowledged an ESXi out-of-bounds write vulnerability that could lead to a sandbox escape exploit and an information disclosure vulnerability in the UHCI USB controller that could be exploited to leak memory from the vmx process.  

Related: VMware vCenter Flaw So Critical, End-of-Life Products Patched

Related: Exploit Code Released for Critical VMware Security Defect

Advertisement. Scroll to continue reading.

Related: Code Execution Vulnerabilities in VMware vCenter Server

Related: VMware Confirms Live Exploits Hitting Just-Patched Vuln

Related Content

Nation-State

CVE-2023-34048, a vCenter Server vulnerability patched in October 2023, had been exploited as zero-day for a year and a half.

Vulnerabilities

VMware warns customers that CVE-2023-34048, a vCenter Server vulnerability patched in October 2023, is being exploited in the wild. 

Vulnerabilities

Aria Automation is affected by a critical vulnerability that could be exploited to gain access to remote organizations and workflows.

Cloud Security

VMware flaw carries a CVSS severity-score of 9.8/10 and can be exploited to bypass login restrictions when authenticating on certain ports.

Cloud Security

VMware described the bug as an out-of-bounds write issue in its implementation of the DCE/RPC protocol. CVSS severity score of 9.8/10.

ICS/OT

Exploit code and root-cause analysis released by SinSinology document the problem as a case where VMware “forgot to regenerate” SSH keys.

Malware & Threats

VWware patches critical flaws that allow hackers to bypass SSH authentication and gain access to the Aria Operations for Networks command line interface.

CISO Conversations

SecurityWeek talks to Field CISOs, Fawaz Rasheed (VMware Carbon Black) and Nabil Hannan (NetSPI), about this emerging role.

Copyright © 2024 SecurityWeek ®, a Wired Business Media Publication. All Rights Reserved.

Exit mobile version