CVE-2024-22267
ENISA EUVD: EUVD-2024-19831 ↗
✓ Confirmed 0-Day
Triaged: March 5, 2026
2 articles
Published: 2024-05-14
EPSS Score
Source: FIRST.org · 2026-05-23
0.12%
probability
This CVE has a 0.12% probability
of being exploited in the next 30 days.
0%
Top 31.2th percentile of all CVEs
100%
CVSS v3.1
Source: VulnerabilityLookup (CIRCL)9.3
CRITICAL
Attack Vector
Local
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Changed
Confidentiality
High
Integrity
High
Availability
High
CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
Description
VulnerabilityLookup (CNA)VMware Workstation and Fusion contain a use-after-free vulnerability in the vbluetooth device. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host.
Affected Products
NA
VMware Workstation
17.x
N/A
VMware Fusion
13.x
Attack Intelligence
CWE-118
· Incorrect Access of Indexable Resource ('Range Error')
CWE-119
· Buffer Overflow
CWE-416
· Use After Free
CWE-664
· Improper Control of a Resource Through its Lifetime
CWE-666
· Operation on Resource in Wrong Phase of Lifetime
CWE-672
· Operation on a Resource after Expiration or Release
CWE-825
· Expired Pointer Dereference
Signal Intelligence
Confidence
85%
EPSS
0.12%
CVSS v3.1
9.3
Mentions
2
Last Seen
May 14, 2024
CNA Information
CNA Assigner
vmware
Analyst Note
CVE-2024-22267 is explicitly named as one of three zero-day vulnerabilities exploited at Pwn2Own 2024, a live hacking competition where exploitation occurs before vendor patches are available. The CVE was published May 14, 2024, consistent with post-competition coordinated disclosure timing.
Triage Info
Decided atMar 05, 2026
Published DateMay 14, 2024