CVE-2024-22267

9.3 CRITICAL

📋 TL;DR

CVE-2024-22267 is a use-after-free vulnerability in VMware Workstation and Fusion's vbluetooth device that allows a malicious actor with local administrative privileges on a virtual machine to execute arbitrary code on the host system as the VMX process. This affects all users running vulnerable versions of VMware Workstation and Fusion with virtual machines that have administrative users.

💻 Affected Systems

Products:
  • VMware Workstation
  • VMware Fusion
Versions: Multiple versions prior to the patched releases
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Requires vbluetooth device to be present and attacker needs local administrative privileges on the guest virtual machine.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Full host compromise allowing attacker to execute arbitrary code with VMX process privileges, potentially leading to complete host takeover, data exfiltration, and lateral movement.

🟠

Likely Case

Privilege escalation from guest VM to host system, allowing attackers to bypass virtualization isolation and gain foothold on the host environment.

🟢

If Mitigated

Limited impact if proper network segmentation, least privilege principles, and host hardening are implemented, though the vulnerability still presents significant risk.

🌐 Internet-Facing: LOW - This requires local administrative access to a virtual machine, making direct internet exploitation unlikely.
🏢 Internal Only: HIGH - Internal attackers with VM administrative access can exploit this to breach host isolation and potentially compromise the entire virtualization environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Exploitation requires local administrative access to a virtual machine and knowledge of the vulnerability. The use-after-free condition must be triggered through specific vbluetooth operations.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: VMware Workstation 17.5.2 and VMware Fusion 13.5.2

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280

Restart Required: Yes

Instructions:

1. Download the latest version from VMware's official website. 2. Run the installer and follow the upgrade process. 3. Restart the host system after installation completes. 4. Verify the update was successful by checking the version number.

🔧 Temporary Workarounds

Disable vbluetooth device

all

Remove or disable the vbluetooth virtual device from virtual machine configurations to eliminate the attack vector.

Edit VMX configuration file and remove or comment out: 'vbluetooth.present = "TRUE"'
In VMware GUI: VM Settings > Remove Bluetooth device

Restrict VM administrative access

all

Implement strict access controls and least privilege principles for virtual machine administrative accounts.

🧯 If You Can't Patch

  • Disable vbluetooth device on all virtual machines immediately
  • Implement network segmentation to isolate vulnerable VMs from critical systems
  • Monitor for suspicious activity from VMs with administrative users
  • Consider migrating critical workloads to patched systems or alternative virtualization platforms

🔍 How to Verify

Check if Vulnerable:

Check VMware version: For Workstation: Help > About VMware Workstation. For Fusion: VMware Fusion > About VMware Fusion. If version is below 17.5.2 (Workstation) or 13.5.2 (Fusion), the system is vulnerable.

Check Version:

Windows: 'vmware -v' in command prompt. Linux: 'vmware --version' in terminal. macOS: Check 'About VMware Fusion' in application menu.

Verify Fix Applied:

After patching, verify version is 17.5.2 or higher for Workstation, or 13.5.2 or higher for Fusion. Also check that vbluetooth device is either removed or the vulnerability is patched.

📡 Detection & Monitoring

Log Indicators:

  • Unusual vbluetooth device activity in VM logs
  • VMX process crashes or unexpected behavior
  • Suspicious process creation from VMX process on host

Network Indicators:

  • Unusual network connections originating from host VMX process
  • Unexpected outbound connections from virtualization host

SIEM Query:

Process creation where parent process is 'vmware-vmx.exe' OR 'vmware-vmx' AND command line contains unusual parameters OR destination IP is suspicious

🔗 References

📤 Share & Export