[CIVN-2026-0117] Multiple Vulnerabilities in VMware Workstation and Fusion

By Published On: March 6, 2026

—–BEGIN PGP SIGNED MESSAGE—–

Hash: SHA256


Multiple Vulnerabilities in VMware Workstation and Fusion


Indian – Computer Emergency Response Team (https://www.cert-in.org.in)


Severity Rating: MEDIUM


Software Affected


VMware Workstation versions prior to 25H2U1

VMware Fusion versions prior to 25H2U1

Overview


Multiple vulnerabilities have been reported in VMware Workstation and Fusion that could be exploited by an attacker to cause denial of service conditions, interrupt or intercept network connections between virtual machines, and obtain limited sensitive information on the target system.


Target Audience:

Enterprises and Large Organizations, Cloud Providers, and industries with IT environments utilizing VMware products.


Risk Assessment:

Potential for system instability, interruption or interception of network communication between virtual machines, and limited information disclosure.


Impact Assessment:

Potential for denial-of-service conditions, interruption or interception of network connections between virtual machines, and limited exposure of sensitive information.


Description


VMware provides virtualization software solutions that enable organizations to create and manage virtual machines (VMs).


These vulnerabilities exist in VMware Workstation and Fusion due to a logic flaw in the management of network packets , a NULL pointer dereference error in VMware Workstation for Windows , an out-of-bounds write vulnerability , and an out-of-bounds read vulnerability.


Successful exploitation could allow an attacker to cause denial of service conditions, interrupt or intercept network connections between virtual machines, and obtain limited sensitive information on the target system.


Solution


Apply appropriate updates as mentioned by the Vendor:

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986



Vendor Information


VMware

www.vmware.com


References


 

https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986


CVE Name

CVE-2026-22715

CVE-2026-22716

CVE-2026-22717

CVE-2026-22722




– —


Thanks and Regards,

CERT-In


Incident Response Help Desk

e-mail: incident@cert-in.org.in

Phone: +91-11-22902657

Toll Free Number: 1800-11-4949

Toll Free Fax : 1800-11-6969

Web: http://www.cert-in.org.in

PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4

PGP Key information:

https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS


Postal address:

Indian Computer Emergency Response Team (CERT-In)

Ministry of Electronics and Information Technology

Government of India

Electronics Niketan

6, C.G.O. Complex

New Delhi-110 003

—–BEGIN PGP SIGNATURE—–


iQIzBAEBCAAdFiEE6r4Iam/Ey0c/KakL3jCgcSdcys8FAmmq3hQACgkQ3jCgcSdc

ys/ZdxAAidFBLPWiCuX7J0HY3RwjKarrHPbSyo9H5ZzQypsjmpNZhUpoFxLSsuIn

5Mhy0sCP+idWHp8FONbZsd9p3Qb1n6+oiYgLu/g7/bmBqp/DWHf/JA2wA/SLUgX8

TaYdBE43XTg9lZ0MAZGAtfUZOmNEX3oDALV2U0bj7g2WlPGJyHnJC3wdlr092t/X

tImRGQnrL2c5N56izAYc5DjaKqLtPJ9X2gADpSfDRB18AFl8NqTkgvIb1GZre7Ek

5SApj/F8khk7A9sCxYSSAmYU+V6c+nyjY0wWLD0WLLwkA+jDlQytanFQIl1EEglB

6mWNpmBcf8XGyLuQrmbltP7bFYI2FbSt7oDJAfmM1uPvvAXZIbq1ljV/bsg1tUqg

lVWnNx2eTu2ZnhO81CZUf91LauxdmddCCaocxoP//e8LVfs5GBClifuN26wnmzsy

oqjhNYuMbgqJZqeW4YmZSJVGEVfzUq0XXM5seaqgglaHNJd7RIkkjOUWbWu8iWIi

bRqNqIkOrC5lXPvWIPeKMouNV+cc72uQuXu0fJ0XEdUeSQYFAXDDP4CYUSESbaSm

nWvlpo6a0RIh2cddNX4LIu1tLV+wzJaSrO9PWUkqUJb8dS6nH8/RegtMo+BAU2Ry

dZLQGtSq+lX/ax+BUmKOqnVEfnOZkBAywLNfvJeSvq0wqjRZmXc=

=wHGq

—–END PGP SIGNATURE—–

Share this article