VMware addressed four vulnerabilities in its Workstation and Fusion desktop hypervisors, including three zero-day flaws demonstrated at the Pwn2Own Vancouver 2024<\/a>.<\/p>\n\n\n\n
Below are descriptions of the flaws addressed by the virtualization giant<\/p>\n\n\n\n
STAR Labs SG and Theori demonstrated these vulnerabilities during the Pwn2Own hacking contest in March 2024.
“VMware would like to thank\u00a0Gwangun Jung (@pr0ln) & Junoh Lee (@bbbig12) of Theori (@theori_io)\u00a0and\u00a0STAR Labs SG\u00a0working with the Pwn2Own 2024 Security Contest for independently reporting this issue to us.” reads<\/a> the advisory.
Follow me on Twitter: @securityaffairs<\/strong><\/a> and Facebook<\/strong><\/a> and Mastodon<\/a><\/p>\n\n\n\n
Pierluigi Paganini<\/strong><\/a><\/p>\n\n\n\n
(<\/strong>SecurityAffairs<\/strong><\/a>\u00a0\u2013<\/strong>\u00a0hacking, zero-day)<\/strong><\/p>\n\n\n\n
The vendor also provided temporary workarounds, such as disabling Bluetooth support and 3D acceleration, until patches can be applied to address vulnerabilities like CVE-2024-22267, CVE-2024-22269, and CVE-2024-22270. The company doesn’t provide any mitigations to address CVE-2024-22270.<\/a><\/p>\n\n\n\n