CVSS 3.1 Score 9.3 of 10 (high)


Published Mar 5, 2024


CVE-2024-22252 is a use-after-free vulnerability found in VMware ESXi, Workstation, and Fusion. This vulnerability allows a malicious actor with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox, while on Workstation and Fusion, it may lead to code execution on the machine where Workstation or Fusion is installed. The vulnerability has a base severity rating of CRITICAL with a base score of 9.3 according to CVSS:3.1. It poses a high risk to organizations as it has a high potential for both integrity and confidentiality impact. To remediate this vulnerability, organizations should update their VMware products to the latest versions provided by VMware.

Explore Beyond the CVE Basics with Recorded Future's Vulnerability Intelligence

Note: This is just a basic overview providing quick insights into CVE-2024-22252 information. Gain full access to comprehensive CVE data, risk scores, prioritization, and mitigation data through Recorded Future's Vulnerability Intelligence:
  • Prioritize with Risk-Based Scoring
  • Explore the Extensive Vulnerability Database
  • Receive Early Alerts on Emerging CVEs
  • Focus on Critical Exploitable Vulnerabilities
  • Streamline Remediation with Integration Options