
[CIVN-2026-0117] Multiple Vulnerabilities in VMware Workstation and Fusion
—–BEGIN PGP SIGNED MESSAGE—–
Hash: SHA256
Multiple Vulnerabilities in VMware Workstation and Fusion
Indian – Computer Emergency Response Team (https://www.cert-in.org.in)
Severity Rating: MEDIUM
Software Affected
VMware Workstation versions prior to 25H2U1
VMware Fusion versions prior to 25H2U1
Overview
Multiple vulnerabilities have been reported in VMware Workstation and Fusion that could be exploited by an attacker to cause denial of service conditions, interrupt or intercept network connections between virtual machines, and obtain limited sensitive information on the target system.
Target Audience:
Enterprises and Large Organizations, Cloud Providers, and industries with IT environments utilizing VMware products.
Risk Assessment:
Potential for system instability, interruption or interception of network communication between virtual machines, and limited information disclosure.
Impact Assessment:
Potential for denial-of-service conditions, interruption or interception of network connections between virtual machines, and limited exposure of sensitive information.
Description
VMware provides virtualization software solutions that enable organizations to create and manage virtual machines (VMs).
These vulnerabilities exist in VMware Workstation and Fusion due to a logic flaw in the management of network packets , a NULL pointer dereference error in VMware Workstation for Windows , an out-of-bounds write vulnerability , and an out-of-bounds read vulnerability.
Successful exploitation could allow an attacker to cause denial of service conditions, interrupt or intercept network connections between virtual machines, and obtain limited sensitive information on the target system.
Solution
Apply appropriate updates as mentioned by the Vendor:
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986
Vendor Information
VMware
www.vmware.com
References
https://support.broadcom.com/web/ecx/support-content-notification/-/external/content/SecurityAdvisories/0/36986
CVE Name
CVE-2026-22715
CVE-2026-22716
CVE-2026-22717
CVE-2026-22722
– —
Thanks and Regards,
CERT-In
Incident Response Help Desk
e-mail: incident@cert-in.org.in
Phone: +91-11-22902657
Toll Free Number: 1800-11-4949
Toll Free Fax : 1800-11-6969
Web: http://www.cert-in.org.in
PGP Fingerprint: A768 083E 4475 5725 B81A A379 2156 C0C0 B620 D0B4
PGP Key information:
https://www.cert-in.org.in/s2cMainServlet?pageid=CONTACTUS
Postal address:
Indian Computer Emergency Response Team (CERT-In)
Ministry of Electronics and Information Technology
Government of India
Electronics Niketan
6, C.G.O. Complex
New Delhi-110 003
—–BEGIN PGP SIGNATURE—–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=wHGq
—–END PGP SIGNATURE—–


