2024-05-21 20:03:32 +00:00
{
"id" : "CVE-2024-22273" ,
"sourceIdentifier" : "security@vmware.com" ,
"published" : "2024-05-21T18:15:08.993" ,
2025-03-26 17:03:50 +00:00
"lastModified" : "2025-03-26T16:15:19.423" ,
"vulnStatus" : "Modified" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2024-05-21 20:03:32 +00:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability.\u00a0A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues."
2024-05-26 02:03:22 +00:00
} ,
{
"lang" : "es" ,
"value" : "Los controladores de almacenamiento en VMware ESXi, Workstation y Fusion tienen una vulnerabilidad de lectura/escritura fuera de los l\u00edmites. Un actor malintencionado con acceso a una m\u00e1quina virtual con controladores de almacenamiento habilitados puede aprovechar este problema para crear una condici\u00f3n de denegaci\u00f3n de servicio o ejecutar c\u00f3digo en el hipervisor desde una m\u00e1quina virtual junto con otros problemas."
2024-05-21 20:03:32 +00:00
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "security@vmware.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 8.1 ,
"baseSeverity" : "HIGH" ,
2024-05-21 20:03:32 +00:00
"attackVector" : "LOCAL" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "NONE" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "HIGH"
2024-05-21 20:03:32 +00:00
} ,
"exploitabilityScore" : 1.4 ,
"impactScore" : 6.0
2025-03-01 03:03:47 +00:00
} ,
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"baseScore" : 7.8 ,
"baseSeverity" : "HIGH" ,
"attackVector" : "LOCAL" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "HIGH" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "HIGH"
} ,
"exploitabilityScore" : 1.8 ,
"impactScore" : 5.9
2024-05-21 20:03:32 +00:00
}
]
} ,
2025-03-01 03:03:47 +00:00
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
} ,
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
2025-03-26 17:03:50 +00:00
} ,
{
"source" : "134c704f-9b21-4f2e-91b3-4a467353bcc0" ,
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
"value" : "CWE-125"
} ,
{
"lang" : "en" ,
"value" : "CWE-787"
}
]
2025-03-01 03:03:47 +00:00
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "4.0" ,
"versionEndExcluding" : "5.1.1" ,
"matchCriteriaId" : "FA6C5CFA-E78F-46EA-B8E0-8AE2A29C9586"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "17.0.0" ,
"versionEndExcluding" : "17.5.1" ,
"matchCriteriaId" : "B0BFB423-5C6D-40F3-960A-53D9955E7621"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "5CBA6B5A-F345-41D1-8AA0-E5F274A2D8FB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*" ,
"matchCriteriaId" : "F030A666-1955-438B-8417-5C294905399F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C8DB7F6-5765-4355-B30E-9CAC39ECA5D9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*" ,
"matchCriteriaId" : "A790D41E-B398-4233-9EC7-CF5BE2BC3161"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*" ,
"matchCriteriaId" : "B7619C16-5306-4C4A-88E8-E80876635F66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*" ,
"matchCriteriaId" : "238E7AF4-722B-423D-ABB1-424286B06715"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*" ,
"matchCriteriaId" : "1E4DE8C7-72FB-4BEC-AD9E-378786295011"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*" ,
"matchCriteriaId" : "2E6DE184-35C8-4A13-91D4-4B43E9F0168C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3E3A02D-6C1E-4DE8-B845-60F53C056F32"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*" ,
"matchCriteriaId" : "12D385F0-DB2B-4802-AD0E-31441DA056B9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*" ,
"matchCriteriaId" : "2C202879-9230-4E1D-BAB8-4FB7CE4BBC24"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*" ,
"matchCriteriaId" : "CC6DC107-5142-4155-A33B-D5BE72E9ED38"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*" ,
"matchCriteriaId" : "39817170-5C45-4F8A-916D-81B7352055DD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*" ,
"matchCriteriaId" : "4ADC3CFF-7415-46A5-817A-2F053B261E8C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2F831A7-544E-4B45-BA49-7F7A0234579C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*" ,
"matchCriteriaId" : "80A0DD2E-F1CC-413B-91F9-E3986011A0A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*" ,
"matchCriteriaId" : "C77771B2-BC64-47A5-B6DB-9CBCC4456B67"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*" ,
"matchCriteriaId" : "86DE9CE6-F6C0-47D2-B3AB-34852A8B9603"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*" ,
"matchCriteriaId" : "E75B2F03-702E-4359-9BB2-E234F1DC38C8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*" ,
"matchCriteriaId" : "ACAA9494-5248-4B01-8BC1-C38AB615FFD7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*" ,
"matchCriteriaId" : "BF12014B-BF2B-42EF-B70C-59CDA8E2176F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*" ,
"matchCriteriaId" : "F965D853-EE4A-41F5-840B-2D009ACC9754"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*" ,
"matchCriteriaId" : "BA7B7313-FF53-43C9-AF4D-B639053D3FA3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*" ,
"matchCriteriaId" : "9FB5738F-27E4-42C6-BD1B-F7F66A7EF0A6"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*" ,
"matchCriteriaId" : "FC3668A6-262B-42BF-9E90-28BAA9BB3347"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*" ,
"matchCriteriaId" : "DA4E9185-44BA-41E6-8600-C8616E199334"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*" ,
"matchCriteriaId" : "F50302BB-B950-4178-A109-358393E0A50A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*" ,
"matchCriteriaId" : "7A1A402A-9262-4B97-A0B7-E5AE045E394D"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*" ,
"matchCriteriaId" : "FE44B379-9943-4DD1-8514-26F87482AFA8"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*" ,
"matchCriteriaId" : "2A797377-8945-4D75-AA68-A768855E5842"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*" ,
"matchCriteriaId" : "79D84D76-54BE-49E9-905C-7D65B4B42D68"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*" ,
"matchCriteriaId" : "2F8767F7-7C3D-457D-9EAC-E8A30796F751"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*" ,
"matchCriteriaId" : "29AF8474-2D7A-4C5A-82B9-7A873AD90C2E"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*" ,
"matchCriteriaId" : "7781A2CA-D927-48CD-9932-AE42B7BA1EFE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*" ,
"matchCriteriaId" : "360C1B71-5360-4379-B0DE-63BB8F5E6DA2"
}
]
}
]
} ,
{
"operator" : "AND" ,
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "13.0.0" ,
"versionEndExcluding" : "13.5.1" ,
"matchCriteriaId" : "50649AB8-57FD-4210-A7F4-3AD7D00F6A91"
}
]
} ,
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : false ,
"criteria" : "cpe:2.3:o:apple:macos:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "387021A0-AF36-463C-A605-32EA7DAC172E"
}
]
}
]
}
] ,
2024-05-21 20:03:32 +00:00
"references" : [
{
"url" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308" ,
2025-03-01 03:03:47 +00:00
"source" : "security@vmware.com" ,
"tags" : [
"Vendor Advisory"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308" ,
2025-03-01 03:03:47 +00:00
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Vendor Advisory"
]
2024-05-21 20:03:32 +00:00
}
]
}