CVE-2024-22269

7.1 HIGH

📋 TL;DR

This vulnerability allows a malicious actor with local administrative privileges on a VMware virtual machine to read privileged information from hypervisor memory via the vbluetooth device. It affects VMware Workstation and Fusion users running vulnerable versions. The attacker must already have administrative access within the guest VM to exploit this.

💻 Affected Systems

Products:
  • VMware Workstation
  • VMware Fusion
Versions: Workstation 17.x prior to 17.5.2, Fusion 13.x prior to 13.5.2
Operating Systems: Windows, Linux, macOS
Default Config Vulnerable: ⚠️ Yes
Notes: Only affects configurations using the vbluetooth virtual device. Requires attacker to have administrative privileges within the guest VM.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

An attacker with administrative access to a guest VM could extract sensitive hypervisor memory contents, potentially including credentials, encryption keys, or other VM data from the host system.

🟠

Likely Case

An insider threat or compromised VM with administrative privileges could access memory contents from other VMs or the host system, leading to data exfiltration or lateral movement.

🟢

If Mitigated

With proper access controls limiting administrative privileges within VMs and network segmentation, the impact is reduced to isolated VM compromise without host system access.

🌐 Internet-Facing: LOW - This requires local administrative access within a VM, not directly exploitable from the internet.
🏢 Internal Only: MEDIUM - Internal attackers with VM administrative privileges could exploit this, but requires specific access level within the virtual environment.

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: MEDIUM

Requires local administrative access within the VM and knowledge of memory structures. No public exploit code available at disclosure.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: Workstation 17.5.2, Fusion 13.5.2

Vendor Advisory: https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24280

Restart Required: Yes

Instructions:

1. Download the latest version from VMware website. 2. Install the update. 3. Restart the host system. 4. Verify the update was successful.

🔧 Temporary Workarounds

Disable vbluetooth device

all

Remove or disable the virtual Bluetooth device in VM settings to prevent exploitation

In VM settings: Remove Bluetooth device from hardware list

🧯 If You Can't Patch

  • Restrict administrative privileges within guest VMs to trusted users only
  • Isolate vulnerable VMs from sensitive systems and implement network segmentation

🔍 How to Verify

Check if Vulnerable:

Check VMware version in Help > About. If Workstation is below 17.5.2 or Fusion below 13.5.2, the system is vulnerable.

Check Version:

On Windows: wmic product get name,version | findstr VMware
On Linux/macOS: vmware --version

Verify Fix Applied:

Verify version shows 17.5.2 or higher for Workstation, 13.5.2 or higher for Fusion in Help > About.

📡 Detection & Monitoring

Log Indicators:

  • Unusual memory access patterns from VM processes
  • Suspicious Bluetooth device operations in VM logs

Network Indicators:

  • Unusual outbound data transfers from VMs to unexpected destinations

SIEM Query:

source="vmware_logs" AND (event_type="memory_access" OR device="vbluetooth") AND severity=high

🔗 References

📤 Share & Export