Vulnerability Details : CVE-2024-22273
The storage controllers on VMware ESXi, Workstation, and Fusion have out-of-bounds read/write vulnerability. A malicious actor with access to a virtual machine with storage controllers enabled may exploit this issue to create a denial of service condition or execute code on the hypervisor from a virtual machine in conjunction with other issues.
Vulnerability category: Execute codeDenial of service
Products affected by CVE-2024-22273
- cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*
- cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3e:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3d:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_2e:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_1e:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3g:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3f:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:-:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:b:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:update_1:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:update_1a:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:update_1c:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:8.0:update_2:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3i:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3j:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3k:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3l:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3m:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3n:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3o:*:*:*:*:*:*
- cpe:2.3:o:vmware:esxi:7.0:update_3p:*:*:*:*:*:*
- cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2024-22273
0.04%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 11 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2024-22273
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.8
|
HIGH | CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H |
1.8
|
5.9
|
NIST | 2025-03-01 |
8.1
|
HIGH | CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:C/C:H/I:H/A:H |
1.4
|
6.0
|
VMware | 2024-05-21 |
CWE ids for CVE-2024-22273
-
The product reads data past the end, or before the beginning, of the intended buffer.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
-
The product writes data past the end, or before the beginning, of the intended buffer.Assigned by:
- 134c704f-9b21-4f2e-91b3-4a467353bcc0 (Secondary)
- nvd@nist.gov (Primary)
References for CVE-2024-22273
-
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/24308
Support Content Notification - Support Portal - Broadcom support portalVendor Advisory
Jump to