VMware swiftly addresses zero-day vulnerabilities showcased at Pwn2Own2024



VMware has recently fixed four vulnerabilities in its Workstation and Fusion desktop hypervisors, including three zero-day flaws that were demonstrated at Pwn2Own Vancouver 2024. These vulnerabilities include a use-after-free flaw in the Bluetooth device, a heap buffer overflow vulnerability in shader functionality, an information disclosure issue in the Bluetooth device, and another information disclosure vulnerability in the Host Guest File Sharing (HGFS) functionality.

The CVE-2024-22267 vulnerability allowed a threat actor with local administrative privileges on a virtual machine to execute code as a virtual machine VMX process running on the host. The CVE-2024-22268 vulnerability could be exploited by a threat actor with non-administrative access to a virtual machine with 3D graphics enabled to create a denial of service condition. On the other hand, the CVE-2024-22269 and CVE-2024-22270 vulnerabilities allowed a threat actor with local administrative privileges to read privileged information contained in a virtual machine’s hypervisor memory through the Bluetooth device and HGFS functionality, respectively.

Temporary workarounds suggested by VMware include disabling Bluetooth support and 3D acceleration until patches are applied to address the vulnerabilities. The company also acknowledged STAR Labs SG and Theori for demonstrating these vulnerabilities during the Pwn2Own hacking competition. VMware thanked Gwangun Jung and Junoh Lee of Theori, as well as STAR Labs SG, for independently reporting the issues.

This prompt response from VMware in fixing these vulnerabilities highlights the importance of addressing security issues promptly to ensure the safety and integrity of virtual environments. By providing patches and temporary workarounds, the company has taken proactive steps to mitigate the risks posed by these zero-day flaws. The collaboration with security researchers and participation in hacking competitions like Pwn2Own also reflects VMware‘s commitment to staying ahead of emerging security threats and protecting its users from potential cyber attacks.



VMware-fixed-zero-days-demonstrated-pwn2own2024.html”>Article Source