VMware VMware

Don't miss out!

Thousands of developers use stack.watch to stay informed.
Get an email whenever new security vulnerabilities are reported in any VMware product.

RSS Feeds for VMware security vulnerabilities

Create a CVE RSS feed including security vulnerabilities found in VMware products with stack.watch. Just hit watch, then grab your custom RSS feed url.

Products by VMware Sorted by Most Security Vulnerabilities since 2018

VMware Cloud Foundation110 vulnerabilities

VMware Esxi87 vulnerabilities

VMware Workstation75 vulnerabilities

VMware Vcenter Server58 vulnerabilities

VMware Fusion48 vulnerabilities

VMware Spring Framework44 vulnerabilities

VMware Esx26 vulnerabilities

VMware Spring Security22 vulnerabilities

VMware Rabbitmq14 vulnerabilities

VMware Vrealize Operations13 vulnerabilities

VMware Vrealize Log Insight12 vulnerabilities

VMware Aria Operations9 vulnerabilities

VMware Vrealize Automation8 vulnerabilities

VMware Spring Boot7 vulnerabilities

VMware Tools7 vulnerabilities

VMware Player5 vulnerabilities

VMware Server5 vulnerabilities

VMware Horizon Client4 vulnerabilities

VMware Open Vm Tools4 vulnerabilities

VMware Spring Cloud Config4 vulnerabilities

VMware Identity Manager3 vulnerabilities

VMware Nsx T Data Center3 vulnerabilities

VMware Photon Os3 vulnerabilities

VMware Remote Console3 vulnerabilities

VMware Telco Cloud Platform3 vulnerabilities

VMware Vma3 vulnerabilities

VMware Ace2 vulnerabilities

VMware Aria Automation2 vulnerabilities

VMware Cloud Director2 vulnerabilities

VMware Ixgben2 vulnerabilities

VMware Rabbitmq Java Client2 vulnerabilities

VMware Workspace One Content2 vulnerabilities

Vmware Hcx2 vulnerabilities

VMware Vrealize Orchestrator2 vulnerabilities

VMware Isolation Segment1 vulnerability

VMware Spring1 vulnerability

VMware Spring Cloud Vault1 vulnerability

VMware Spring For Graphql1 vulnerability

VMware Spring Hateoas1 vulnerability

VMware Spring Session1 vulnerability

Recent VMware Security Advisories

Advisory Title Published
VMSA-2021-0006 VMSA-2021-0006 April 19, 2021
VMSA-2021-0003 VMSA-2021-0003 April 6, 2021
VMSA-2021-0002 VMSA-2021-0002 April 6, 2021
VMSA-2021-0001 VMSA-2021-0001 April 6, 2021
VMSA-2021-0004 VMSA-2021-0004 April 6, 2021
VMSA-2021-0005 VMSA-2021-0005 April 6, 2021

Known Exploited VMware Vulnerabilities

The following VMware vulnerabilities have recently been marked by CISA as Known to be Exploited by threat actors.

Title Description Added
VMware ESXi and Workstation TOCTOU Race Condition Vulnerability VMware ESXi and Workstation contain a time-of-check time-of-use (TOCTOU) race condition vulnerability that leads to an out-of-bounds write. Successful exploitation enables an attacker with local administrative privileges on a virtual machine to execute code as the virtual machine's VMX process running on the host.
CVE-2025-22224 Exploit Probability: 33.7%
March 4, 2025
VMware ESXi Arbitrary Write Vulnerability VMware ESXi contains an arbitrary write vulnerability. Successful exploitation allows an attacker with privileges within the VMX process to trigger an arbitrary kernel write leading to an escape of the sandbox.
CVE-2025-22225 Exploit Probability: 4.7%
March 4, 2025
VMware ESXi, Workstation, and Fusion Information Disclosure Vulnerability VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. Successful exploitation allows an attacker with administrative privileges to a virtual machine to leak memory from the vmx process.
CVE-2025-22226 Exploit Probability: 4.9%
March 4, 2025
VMware vCenter Server Heap-Based Buffer Overflow Vulnerability VMware vCenter Server contains a heap-based buffer overflow vulnerability in the implementation of the DCERPC protocol. This vulnerability could allow an attacker with network access to the vCenter Server to execute remote code by sending a specially crafted packet.
CVE-2024-38812 Exploit Probability: 58.0%
November 20, 2024
VMware vCenter Server Privilege Escalation Vulnerability VMware vCenter contains an improper check for dropped privileges vulnerability. This vulnerability could allow an attacker with network access to the vCenter Server to escalate privileges to root by sending a specially crafted packet.
CVE-2024-38813 Exploit Probability: 14.6%
November 20, 2024
VMware ESXi Authentication Bypass Vulnerability VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.
CVE-2024-37085 Exploit Probability: 53.7%
July 30, 2024
VMware vCenter Server Incorrect Default File Permissions Vulnerability VMware vCenter Server contains an incorrect default file permissions vulnerability that allows a remote, privileged attacker to gain access to sensitive information.
CVE-2022-22948 Exploit Probability: 11.5%
July 17, 2024
VMware vCenter Server Out-of-Bounds Write Vulnerability VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.
CVE-2023-34048 Exploit Probability: 92.0%
January 22, 2024
VMware Tools Authentication Bypass Vulnerability VMware Tools contains an authentication bypass vulnerability in the vgauth module. A fully compromised ESXi host can force VMware Tools to fail to authenticate host-to-guest operations, impacting the confidentiality and integrity of the guest virtual machine. An attacker must have root access over ESXi to exploit this vulnerability.
CVE-2023-20867 Exploit Probability: 0.5%
June 23, 2023
Vmware Aria Operations for Networks Command Injection Vulnerability VMware Aria Operations for Networks (formerly vRealize Network Insight) contains a command injection vulnerability that allows a malicious actor with network access to perform an attack resulting in remote code execution.
CVE-2023-20887 Exploit Probability: 94.4%
June 22, 2023
VMware Spring Cloud Gateway Code Injection Vulnerability Spring Cloud Gateway applications are vulnerable to a code injection attack when the Gateway Actuator endpoint is enabled, exposed and unsecured.
CVE-2022-22947 Exploit Probability: 94.5%
May 16, 2022
VMware Multiple Products Privilege Escalation Vulnerability VMware Workspace ONE Access, Identity Manager and vRealize Automation contain a privilege escalation vulnerability due to improper permissions in support scripts.
CVE-2022-22960 Exploit Probability: 75.8%
April 15, 2022
VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability VMware Workspace ONE Access and Identity Manager allow for remote code execution due to server-side template injection.
CVE-2022-22954 Exploit Probability: 94.4%
April 14, 2022
Spring Framework JDK 9+ Remote Code Execution Vulnerability Spring MVC or Spring WebFlux application running on JDK 9+ may be vulnerable to remote code execution (RCE) via data binding.
CVE-2022-22965 Exploit Probability: 94.5%
April 4, 2022
VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability VMware SD-WAN Edge by VeloCloud contains a command injection vulnerability in the local web UI component. Successful exploitation of this issue could result in remote code execution.
CVE-2018-6961 Exploit Probability: 92.0%
March 25, 2022
VMware vCenter Server and Cloud Foundation Server Side Request Forgery (SSRF) Vulnerability VMware vCenter Server and Cloud Foundation Server contain a SSRF vulnerability due to improper validation of URLs in a vCenter Server plugin. This allows for information disclosure.
CVE-2021-21973 Exploit Probability: 89.9%
March 7, 2022
VMware Server Side Request Forgery in vRealize Operations Manager API Server Side Request Forgery (SSRF) in vRealize Operations Manager API prior to 8.4 may allow a malicious actor with network access to the vRealize Operations Manager API to perform a SSRF attack to steal administrative credentials.
CVE-2021-21975 Exploit Probability: 94.4%
January 18, 2022
VMware vCenter Server Improper Access Control Rhttproxy as used in vCenter Server contains a vulnerability due to improper implementation of URI normalization.
CVE-2021-22017 Exploit Probability: 79.2%
January 10, 2022
VMware ESXi/Horizon DaaS Appliances Heap-Overwrite Vulnerability OpenSLP as used in ESXi and the Horizon DaaS appliances have a heap overwrite issue. A malicious actor with network access to port 427 on an ESXi host or on any Horizon DaaS management appliance may be able to overwrite the heap of the OpenSLP service resulting in remote code execution.
CVE-2019-5544 Exploit Probability: 87.1%
November 3, 2021
VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector Comm VMware Workspace One Access, Access Connector, Identity Manager, and Identity Manager Connector address have a command injection vulnerability.
CVE-2020-4006 Exploit Probability: 15.4%
November 3, 2021

Of the known exploited vulnerabilities above, 10 are in the top 1%, or the 99th percentile of the EPSS exploit probability rankings. 4 known exploited VMware vulnerabilities are in the top 5% (95th percentile or greater) of the EPSS exploit probability rankings.

Top 10 Riskiest VMware Vulnerabilities

Based on the current exploit probability, these VMware vulnerabilities are on CISA's Known Exploited vulnerabilities list (KEV) and are ranked by the current EPSS exploit probability.

Rank CVE EPSS Vulnerability
1 CVE-2022-22947 94.5% VMware Spring Cloud Gateway Code Injection Vulnerability
2 CVE-2022-22965 94.5% Spring Framework JDK 9+ Remote Code Execution Vulnerability
3 CVE-2022-22954 94.4% VMware Workspace ONE Access and Identity Manager Server-Side Template Injection Vulnerability
4 CVE-2021-22005 94.4% VMware vCenter Server File Upload
5 CVE-2021-21975 94.4% VMware Server Side Request Forgery in vRealize Operations Manager API
6 CVE-2023-20887 94.4% Vmware Aria Operations for Networks Command Injection Vulnerability
7 CVE-2021-21985 94.4% VMware vCenter Server Remote Code Execution Vulnerability
8 CVE-2021-21972 93.7% VMware vCenter Server Remote Code Execution Vulnerability
9 CVE-2020-3952 93.2% VMware vCenter Server Info Disclosure Vulnerability
10 CVE-2018-6961 92.0% VMware SD-WAN Edge by VeloCloud Command Injection Vulnerability

By the Year

In 2025 there have been 9 vulnerabilities in VMware with an average score of 7.0 out of ten. Last year, in 2024 VMware had 46 security vulnerabilities published. Right now, VMware is on track to have less security vulnerabilities in 2025 than it did last year. Last year, the average CVE base score was greater by 0.04




Year Vulnerabilities Average Score
2025 9 6.98
2024 46 7.02
2023 72 7.32
2022 79 7.21
2021 77 7.29
2020 61 7.01
2019 31 7.16
2018 51 7.38

It may take a day or so for new VMware vulnerabilities to show up in the stats or in the list of recent security vulnerabilties. Additionally vulnerabilities may be tagged under a different product or component name.

Recent VMware Security Vulnerabilities

VMware Cloud Foundation contains a missing authorisation vulnerability

CVE-2025-41231 - May 20, 2025

VMware Cloud Foundation contains a missing authorisation vulnerability. A malicious actor with access to VMware Cloud Foundation appliance may be able to perform certain unauthorised actions and access limited sensitive information.

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write

CVE-2025-22224 8.2 - High - March 04, 2025

VMware ESXi, and Workstation contain a TOCTOU (Time-of-Check Time-of-Use) vulnerability that leads to an out-of-bounds write. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

VMware ESXi contains an arbitrary write vulnerability

CVE-2025-22225 8.2 - High - March 04, 2025

VMware ESXi contains an arbitrary write vulnerability. A malicious actor with privileges within the VMX process may trigger an arbitrary kernel write leading to an escape of the sandbox.

Write-what-where Condition

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS

CVE-2025-22226 6 - Medium - March 04, 2025

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability due to an out-of-bounds read in HGFS. A malicious actor with administrative privileges to a virtual machine may be able to exploit this issue to leak memory from the vmx process.

VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability

CVE-2025-22219 9 - Critical - January 30, 2025

VMware Aria Operations for Logs contains a stored cross-site scripting vulnerability. A malicious actor with non-administrative privileges may be able to inject a malicious script that (can perform stored cross-site scripting) may lead to arbitrary operations as admin user.

VMware Aria Operations for Logs contains a privilege escalation vulnerability

CVE-2025-22220 5.4 - Medium - January 30, 2025

VMware Aria Operations for Logs contains a privilege escalation vulnerability. A malicious actor with non-administrative privileges and network access to Aria Operations for Logs API may be able to perform certain operations in the context of an admin user.

VMware Aria Operation for Logs contains a stored cross-site scripting vulnerability

CVE-2025-22221 4.8 - Medium - January 30, 2025

VMware Aria Operation for Logs contains a stored cross-site scripting vulnerability. A malicious actor with admin privileges to VMware Aria Operations for Logs may be able to inject a malicious script that could be executed in a victim's browser when performing a delete action in the Agent Configuration.

VMware Aria Operations contains an information disclosure vulnerability

CVE-2025-22222 6.5 - Medium - January 30, 2025

VMware Aria Operations contains an information disclosure vulnerability. A malicious user with non-administrative privileges may exploit this vulnerability to retrieve credentials for an outbound plugin if a valid service credential ID is known.

VMware Aria Operations for Logs contains an information disclosure vulnerability

CVE-2025-22218 7.7 - High - January 30, 2025

VMware Aria Operations for Logs contains an information disclosure vulnerability. A malicious actor with View Only Admin permissions may be able to read the credentials of a VMware product integrated with VMware Aria Operations for Logs

Spring Framework Path Traversal Vulnerability in WebMvc.fn and WebFlux.fn

CVE-2024-38819 - December 19, 2024

Applications serving static resources through the functional web frameworks WebMvc.fn or WebFlux.fn are vulnerable to path traversal attacks. An attacker can craft malicious HTTP requests and obtain any file on the file system that is also accessible to the process in which the Spring application is running.

VMware Aria Operations contains a local privilege escalation vulnerability

CVE-2024-38830 7.8 - High - November 26, 2024

VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with local administrative privileges may trigger this vulnerability to escalate privileges to root user on the appliance running VMware Aria Operations.

VMware Aria Operations contains a local privilege escalation vulnerability

CVE-2024-38831 7.8 - High - November 26, 2024

VMware Aria Operations contains a local privilege escalation vulnerability.  A malicious actor with local administrative privileges can insert malicious commands into the properties file to escalate privileges to  a root user on the appliance running VMware Aria Operations.

VMware Aria Operations contains a stored cross-site scripting vulnerability

CVE-2024-38832 6.4 - Medium - November 26, 2024

VMware Aria Operations contains a stored cross-site scripting vulnerability. A malicious actor with editing access to views may be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations.

VMware Aria Operations contains a stored cross-site scripting vulnerability

CVE-2024-38833 5.4 - Medium - November 26, 2024

VMware Aria Operations contains a stored cross-site scripting vulnerability. A malicious actor with editing access to email templates might inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations.

VMware Aria Operations contains a stored cross-site scripting vulnerability

CVE-2024-38834 4.8 - Medium - November 26, 2024

VMware Aria Operations contains a stored cross-site scripting vulnerability. A malicious actor with editing access to cloud provider might be able to inject malicious script leading to stored cross-site scripting in the product VMware Aria Operations.

The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive

CVE-2024-38820 5.3 - Medium - October 18, 2024

The fix for CVE-2022-22968 made disallowedFields patterns in DataBinder case insensitive. However, String.toLowerCase() has some Locale dependent exceptions that could potentially result in fields not protected as expected.

An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware

CVE-2024-38814 8.8 - High - October 16, 2024

An authenticated SQL injection vulnerability in VMware HCX was privately reported to VMware. A malicious authenticated user with non-administrator privileges may be able to enter specially crafted SQL queries and perform unauthorized remote code execution on the HCX manager.  Updates are available to remediate this vulnerability in affected VMware products.

SQL Injection

The vCenter Server contains a privilege escalation vulnerability

CVE-2024-38813 9.8 - Critical - September 17, 2024

The vCenter Server contains a privilege escalation vulnerability. A malicious actor with network access to vCenter Server may trigger this vulnerability to escalate privileges to root by sending a specially crafted network packet.

Improper Check for Dropped Privileges

The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol

CVE-2024-38812 9.8 - Critical - September 17, 2024

The vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Memory Corruption

VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable

CVE-2024-38811 7.8 - High - September 03, 2024

VMware Fusion (13.x before 13.6) contains a code-execution vulnerability due to the usage of an insecure environment variable. A malicious actor with standard user privileges may exploit this vulnerability to execute code in the context of the Fusion application.

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression

CVE-2024-38808 - August 20, 2024

In Spring Framework versions 5.3.0 - 5.3.38 and older unsupported versions, it is possible for a user to provide a specially crafted Spring Expression Language (SpEL) expression that may cause a denial of service (DoS) condition. Specifically, an application is vulnerable when the following is true: * The application evaluates user-supplied SpEL expressions.

Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1

CVE-2024-38810 7.5 - High - August 20, 2024

Missing Authorization When Using @AuthorizeReturnObject in Spring Security 6.3.0 and 6.3.1 allows attacker to render security annotations inaffective.

AuthZ

In Spring Cloud Data Flow versions prior to 2.11.4,  a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system

CVE-2024-37084 8.8 - High - July 25, 2024

In Spring Cloud Data Flow versions prior to 2.11.4,  a malicious user who has access to the Skipper server api can use a crafted upload request to write an arbitrary file to any location on the file system which could lead to compromising the server

VMware Aria Automation does not apply correct input validation which allows for SQL-injection in the product

CVE-2024-22280 8.1 - High - July 11, 2024

VMware Aria Automation does not apply correct input validation which allows for SQL-injection in the product. An authenticated malicious user could enter specially crafted SQL queries and perform unauthorised read/write operations in the database.

SQL Injection

VMware Cloud Director Availability contains an HTML injection vulnerability

CVE-2024-22277 5.4 - Medium - July 04, 2024

VMware Cloud Director Availability contains an HTML injection vulnerability. A malicious actor with network access to VMware Cloud Director Availability can craft malicious HTML tags to execute within replication tasks.

XSS

VMware ESXi contains an authentication bypass vulnerability

CVE-2024-37085 7.2 - High - June 25, 2024

VMware ESXi contains an authentication bypass vulnerability. A malicious actor with sufficient Active Directory (AD) permissions can gain full access to an ESXi host that was previously configured to use AD for user management https://blogs.vmware.com/vsphere/2012/09/joining-vsphere-hosts-to-active-directory.html by re-creating the configured AD group ('ESXi Admins' by default) after it was deleted from AD.

authentification

VMware ESXi contains an out-of-bounds read vulnerability

CVE-2024-37086 - June 25, 2024

VMware ESXi contains an out-of-bounds read vulnerability. A malicious actor with local administrative privileges on a virtual machine with an existing snapshot may trigger an out-of-bounds read leading to a denial-of-service condition of the host.

The vCenter Server contains a denial-of-service vulnerability

CVE-2024-37087 - June 25, 2024

The vCenter Server contains a denial-of-service vulnerability. A malicious actor with network access to vCenter Server may create a denial-of-service condition.

The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo

CVE-2024-37081 - June 18, 2024

The vCenter Server contains multiple local privilege escalation vulnerabilities due to misconfiguration of sudo. An authenticated local user with non-administrative privileges may exploit these issues to elevate privileges to root on vCenter Server Appliance.

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol

CVE-2024-37080 9.8 - Critical - June 18, 2024

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Memory Corruption

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol

CVE-2024-37079 9.8 - Critical - June 18, 2024

vCenter Server contains a heap-overflow vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger this vulnerability by sending a specially crafted network packet potentially leading to remote code execution.

Memory Corruption

The vCenter Server contains an authenticated remote code execution vulnerability

CVE-2024-22274 - May 21, 2024

The vCenter Server contains an authenticated remote code execution vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to run arbitrary commands on the underlying operating system.

The vCenter Server contains a partial file read vulnerability

CVE-2024-22275 - May 21, 2024

The vCenter Server contains a partial file read vulnerability. A malicious actor with administrative privileges on the vCenter appliance shell may exploit this issue to partially read arbitrary files containing sensitive data.

The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability

CVE-2024-22273 7.8 - High - May 21, 2024

The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.

Out-of-bounds Read

VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device

CVE-2024-22269 6 - Medium - May 14, 2024

VMware Workstation and Fusion contain an information disclosure vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.

VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device

CVE-2024-22267 8.2 - High - May 14, 2024

VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.

Dangling pointer

VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality

CVE-2024-22270 6 - Medium - May 14, 2024

VMware Workstation and Fusion contain an information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality. A malicious actor with local administrative privileges on a virtual machine may be able to read privileged information contained in hypervisor memory from a virtual machine.

Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g

CVE-2024-22259 - March 16, 2024

Applications that use UriComponentsBuilder in Spring Framework to parse an externally provided URL (e.g. through a query parameter) AND perform validation checks on the host of the parsed URL may be vulnerable to a open redirect https://cwe.mitre.org/data/definitions/601.html  attack or to a SSRF attack if the URL is used after passing validation checks. This is the same as CVE-2024-22243 https://spring.io/security/cve-2024-22243 , but with different input.

VMware Cloud Director contains a partial information disclosure vulnerability

CVE-2024-22256 4.3 - Medium - March 07, 2024

VMware Cloud Director contains a partial information disclosure vulnerability. A malicious actor can potentially gather information about organization names based on the behavior of the instance.

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller

CVE-2024-22253 6.7 - Medium - March 05, 2024

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the UHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

VMware ESXi contains an out-of-bounds write vulnerability

CVE-2024-22254 8.2 - High - March 05, 2024

VMware ESXi contains an out-of-bounds write vulnerability. A malicious actor with privileges within the VMX process may trigger an out-of-bounds write leading to an escape of the sandbox.

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller

CVE-2024-22255 - March 05, 2024

VMware ESXi, Workstation, and Fusion contain an information disclosure vulnerability in the UHCI USB controller. A malicious actor with administrative access to a virtual machine may be able to exploit this issue to leak memory from the vmx process.  

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller

CVE-2024-22252 6.7 - Medium - March 05, 2024

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Dangling pointer

VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device)

CVE-2024-22251 4.4 - Medium - February 29, 2024

VMware Workstation and Fusion contain an out-of-bounds read vulnerability in the USB CCID (chip card interface device). A malicious actor with local administrative privileges on a virtual machine may trigger an out-of-bounds read leading to information disclosure.

VMware Aria Operations contains a local privilege escalation vulnerability

CVE-2024-22235 6.7 - Medium - February 21, 2024

VMware Aria Operations contains a local privilege escalation vulnerability. A malicious actor with administrative access to the local system can escalate privileges to 'root'.

In Spring Security

CVE-2024-22234 7.4 - High - February 20, 2024

In Spring Security, versions 6.1.x prior to 6.1.7 and versions 6.2.x prior to 6.2.2, an application is vulnerable to broken access control when it directly uses the AuthenticationTrustResolver.isFullyAuthenticated(Authentication) method. Specifically, an application is vulnerable if: * The application uses AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly and a null authentication parameter is passed to it resulting in an erroneous true return value. An application is not vulnerable if any of the following is true: * The application does not use AuthenticationTrustResolver.isFullyAuthenticated(Authentication) directly. * The application does not pass null to AuthenticationTrustResolver.isFullyAuthenticated * The application only uses isFullyAuthenticated via Method Security https://docs.spring.io/spring-security/reference/servlet/authorization/method-security.html  or HTTP Request Security https://docs.spring.io/spring-security/reference/servlet/authorization/authorize-http-requests.html

Aria Operations for Networks contains a cross site scripting vulnerability

CVE-2024-22238 4.8 - Medium - February 06, 2024

Aria Operations for Networks contains a cross site scripting vulnerability. A malicious actor with admin privileges may be able to inject malicious code into user profile configurations due to improper input sanitization.

XSS

Aria Operations for Networks contains a local privilege escalation vulnerability

CVE-2024-22237 7.8 - High - February 06, 2024

Aria Operations for Networks contains a local privilege escalation vulnerability. A console user with access to Aria Operations for Networks may exploit this vulnerability to escalate privileges to gain root access to the system.

Improper Privilege Management

Aria Operations for Networks contains a local privilege escalation vulnerability

CVE-2024-22239 7.8 - High - February 06, 2024

Aria Operations for Networks contains a local privilege escalation vulnerability. A console user with access to Aria Operations for Networks may exploit this vulnerability to escalate privileges to gain regular shell access.

Improper Privilege Management

Aria Operations for Networks contains a cross site scripting vulnerability

CVE-2024-22241 4.8 - Medium - February 06, 2024

Aria Operations for Networks contains a cross site scripting vulnerability. A malicious actor with admin privileges can inject a malicious payload into the login banner and takeover the user account.  

XSS

Built by Foundeo Inc., with data from the National Vulnerability Database (NVD). Privacy Policy. Use of this site is governed by the Legal Terms
Disclaimer
CONTENT ON THIS WEBSITE IS PROVIDED ON AN "AS IS" BASIS AND DOES NOT IMPLY ANY KIND OF GUARANTEE OR WARRANTY, INCLUDING THE WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR USE. YOUR USE OF THE INFORMATION ON THE DOCUMENT OR MATERIALS LINKED FROM THE DOCUMENT IS AT YOUR OWN RISK. Always check with your vendor for the most up to date, and accurate information.