Rewterz Threat Update – New Critical TeamCity Authentication Bypass Flaws with Publicly Available Exploit
March 6, 2024Rewterz Threat Advisory – CVE-2024-26622 – Linux Kernel Vulnerability
March 6, 2024Rewterz Threat Update – New Critical TeamCity Authentication Bypass Flaws with Publicly Available Exploit
March 6, 2024Rewterz Threat Advisory – CVE-2024-26622 – Linux Kernel Vulnerability
March 6, 2024Severity
High
Analysis Summary
CVE-2024-22255 CVSS:7.1
VMware ESXi, Workstation, and Fusion could allow a local attacker to obtain sensitive information, caused by a memory leak in the VMX sandbox process in the UHCI USB controller. An attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
CVE-2024-22254 CVSS:7.9
VMware ESXi could allow a local authenticated attacker to execute arbitrary code on the system, caused by an out-of-bounds write in the VMX sandbox process. An attacker could exploit this vulnerability to conduct a sandbox escape execute arbitrary code on the system.
CVE-2024-22253 CVSS:9.3
VMware ESXi, Workstation, and Fusion could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free flaw in the VMX sandbox process in the UHCI USB controller. An attacker could exploit this vulnerability to execute arbitrary code on the system.
CVE-2024-22252 CVSS:9.3
VMware ESXi, Workstation, and Fusion could allow a local attacker to execute arbitrary code on the system, caused by a use-after-free flaw in the VMX sandbox process in the XHCI USB controller. An attacker could exploit this vulnerability to execute arbitrary code on the system.
Impact
- Gain Access
- Code Execution
- Information Gain
Indicators Of Compromise
CVE
- CVE-2024-22255
- CVE-2024-22254
- CVE-2024-22253
- CVE-2024-22252
Affected Vendors
VMware
Affected Products
- VMware ESXi 7.0
- VMware Cloud Foundation 4.0
- VMware ESXi 8.0
- VMware Fusion 13
- VMware Workstation 17
- VMware Cloud Foundation 5.0
Remediation
Refer to VMware Security Advisory for patch, upgrade or suggested workaround information.