CVE-2026-22717: CWE-125 Out-of-bounds Read in VMware Workstation
Out-of-bound read vulnerability in VMware Workstation 25H1 and below on any platform allows an actor with non-administrative privileges on a guest VM to obtain limited information disclosure from the machine where VMware Workstation is installed.
AI Analysis
Technical Summary
CVE-2026-22717 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in VMware Workstation versions 25H1 and earlier across all supported platforms. This vulnerability allows an attacker with non-administrative privileges inside a guest virtual machine to perform an out-of-bounds read operation on the host system where VMware Workstation is installed. The flaw enables limited information disclosure from the host to the guest, potentially leaking sensitive data. The attack vector requires local access to the guest VM and user interaction, with a high attack complexity, meaning exploitation is not straightforward. The vulnerability does not allow privilege escalation or code execution but compromises confidentiality to a limited extent. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited impact and exploitation requirements. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The issue arises from improper bounds checking in the VMware Workstation code handling guest-host interactions, leading to reading memory outside intended boundaries. This could be leveraged by malicious insiders or attackers who gain guest VM access to gather information about the host environment, which might assist in further attacks or reconnaissance.
Potential Impact
The primary impact of CVE-2026-22717 is limited information disclosure from the host system to an attacker operating within a guest VM. This compromises confidentiality but does not affect integrity or availability. Organizations using VMware Workstation in environments where guest VMs are accessible to untrusted or semi-trusted users face a risk of sensitive host data leakage. Although the information disclosed is limited, it could aid attackers in crafting more targeted attacks or escalating privileges through other vulnerabilities. The requirement for local guest VM access and user interaction reduces the likelihood of widespread exploitation. However, in environments such as development, testing, or shared hosting where multiple users have guest VM access, the risk is more pronounced. Enterprises relying heavily on VMware Workstation for virtualization, especially those with sensitive host environments, should consider this vulnerability a security concern. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation attempts once details become widely known.
Mitigation Recommendations
To mitigate CVE-2026-22717, organizations should implement strict access controls to limit who can operate guest VMs, ensuring only trusted users have access. Disable or restrict features that allow guest-to-host communication unless absolutely necessary. Monitor guest VM activity for unusual behavior that could indicate exploitation attempts. Apply the principle of least privilege within guest VMs to reduce the potential impact of compromised guest accounts. VMware should be monitored for official patches or updates addressing this vulnerability, and these should be applied promptly once available. In the interim, consider isolating critical host systems from environments where untrusted guest VM users operate. Employ network segmentation and host-based intrusion detection systems to detect anomalous access patterns. Additionally, educate users about the risks of interacting with untrusted guest VMs and enforce policies to prevent unauthorized software execution within guest environments.
Affected Countries
United States, Germany, Japan, South Korea, United Kingdom, Canada, Australia, France, China
CVE-2026-22717: CWE-125 Out-of-bounds Read in VMware Workstation
Description
Out-of-bound read vulnerability in VMware Workstation 25H1 and below on any platform allows an actor with non-administrative privileges on a guest VM to obtain limited information disclosure from the machine where VMware Workstation is installed.
AI-Powered Analysis
Technical Analysis
CVE-2026-22717 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in VMware Workstation versions 25H1 and earlier across all supported platforms. This vulnerability allows an attacker with non-administrative privileges inside a guest virtual machine to perform an out-of-bounds read operation on the host system where VMware Workstation is installed. The flaw enables limited information disclosure from the host to the guest, potentially leaking sensitive data. The attack vector requires local access to the guest VM and user interaction, with a high attack complexity, meaning exploitation is not straightforward. The vulnerability does not allow privilege escalation or code execution but compromises confidentiality to a limited extent. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited impact and exploitation requirements. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The issue arises from improper bounds checking in the VMware Workstation code handling guest-host interactions, leading to reading memory outside intended boundaries. This could be leveraged by malicious insiders or attackers who gain guest VM access to gather information about the host environment, which might assist in further attacks or reconnaissance.
Potential Impact
The primary impact of CVE-2026-22717 is limited information disclosure from the host system to an attacker operating within a guest VM. This compromises confidentiality but does not affect integrity or availability. Organizations using VMware Workstation in environments where guest VMs are accessible to untrusted or semi-trusted users face a risk of sensitive host data leakage. Although the information disclosed is limited, it could aid attackers in crafting more targeted attacks or escalating privileges through other vulnerabilities. The requirement for local guest VM access and user interaction reduces the likelihood of widespread exploitation. However, in environments such as development, testing, or shared hosting where multiple users have guest VM access, the risk is more pronounced. Enterprises relying heavily on VMware Workstation for virtualization, especially those with sensitive host environments, should consider this vulnerability a security concern. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation attempts once details become widely known.
Mitigation Recommendations
To mitigate CVE-2026-22717, organizations should implement strict access controls to limit who can operate guest VMs, ensuring only trusted users have access. Disable or restrict features that allow guest-to-host communication unless absolutely necessary. Monitor guest VM activity for unusual behavior that could indicate exploitation attempts. Apply the principle of least privilege within guest VMs to reduce the potential impact of compromised guest accounts. VMware should be monitored for official patches or updates addressing this vulnerability, and these should be applied promptly once available. In the interim, consider isolating critical host systems from environments where untrusted guest VM users operate. Employ network segmentation and host-based intrusion detection systems to detect anomalous access patterns. Additionally, educate users about the risks of interacting with untrusted guest VMs and enforce policies to prevent unauthorized software execution within guest environments.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- vmware
- Date Reserved
- 2026-01-09T06:54:36.841Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a1efd332ffcdb8a269c8f8
Added to database: 2/27/2026, 7:26:11 PM
Last enriched: 2/27/2026, 7:44:03 PM
Last updated: 2/28/2026, 5:43:13 AM
Views: 8
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
CVE-2024-29741: Elevation of privilege in Google Android
HighCVE-2026-28426: CWE-79: Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in statamic cms
HighCVE-2025-11252: CWE-89 Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection') in Signum Technology Promotion and Training Inc. windesk.fm
CriticalCVE-2026-2647
UnknownCVE-2026-28425: CWE-94: Improper Control of Generation of Code ('Code Injection') in statamic cms
HighActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.