8.2
CVSSv3

CVE-2022-31705

Published: 14/12/2022 Updated: 19/12/2022
CVSS v3 Base Score: 8.2 | Impact Score: 6 | Exploitability Score: 1.5
VMScore: 0

Vulnerability Summary

VMware ESXi, Workstation, and Fusion contain a heap out-of-bounds write vulnerability in the USB 2.0 controller (EHCI). A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine's VMX process running on the host. On ESXi, the exploitation is contained within the VMX sandbox whereas, on Workstation and Fusion, this may lead to code execution on the machine where Workstation or Fusion is installed.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

vmware esxi 7.0

vmware workstation

vmware esxi 8.0

vmware fusion

Vendor Advisories

Sign up for Security Advisories Stay up to date on the latest VMware Security advisories and updates ...

Github Repositories

CVE-2022-31705 (Geekpwn 2022 Vmware EHCI OOB) POC

CVE-2022-31705 Intro wwwvmwarecom/content/vmware/vmware-published-sites/us/security/advisories/VMSA-2022-0033htmlhtml Test on windows vmware workstation 1620, with guest os ubuntu server 22 At leat one usb device is be attached to guest machine change the 'qh->field4' in the ehcic code Type 'sudo /runsh' to compile and run the poc E

Recent Articles

Microsoft ain't the only one squashing exploited-in-the-wild bugs this month
The Register

Topics Security Off-Prem On-Prem Software Offbeat Vendor Voice Vendor Voice Resources Plus there's a PoC for this unpatched Cisco bug

Patch Tuesday For its final Patch Tuesday of the year, Microsoft fixed one bug that's already been exploited in the wild – and another that's publicly known. That brings its total for December to 49 patched vulnerabilities, six of which are rated critical. The bug that's listed as exploited-in-the-wild is tracked as CVE-2022-44698. It's a Windows SmartScreen security feature bypass vulnerability, and it received a 5.4 CVSS rating. "An attacker can craft a malicious file that would evade Mark o...