Skip to main content
Press slash or control plus K to focus the search. Use the arrow keys to navigate results and press enter to open a threat.
Reconnecting to live updates…

CVE-2026-22717: CWE-125 Out-of-bounds Read in VMware Workstation

0
Low
VulnerabilityCVE-2026-22717cvecve-2026-22717cwe-125
Published: Fri Feb 27 2026 (02/27/2026, 19:11:54 UTC)
Source: CVE Database V5
Vendor/Project: VMware
Product: Workstation

Description

Out-of-bound read vulnerability in VMware Workstation 25H1 and below on any platform allows an actor with non-administrative privileges on a guest VM to obtain limited information disclosure from the machine where VMware Workstation is installed.

AI-Powered Analysis

AILast updated: 02/27/2026, 19:44:03 UTC

Technical Analysis

CVE-2026-22717 is a security vulnerability classified as CWE-125 (Out-of-bounds Read) found in VMware Workstation versions 25H1 and earlier across all supported platforms. This vulnerability allows an attacker with non-administrative privileges inside a guest virtual machine to perform an out-of-bounds read operation on the host system where VMware Workstation is installed. The flaw enables limited information disclosure from the host to the guest, potentially leaking sensitive data. The attack vector requires local access to the guest VM and user interaction, with a high attack complexity, meaning exploitation is not straightforward. The vulnerability does not allow privilege escalation or code execution but compromises confidentiality to a limited extent. The CVSS v3.1 base score is 2.7, reflecting low severity due to the limited impact and exploitation requirements. No patches or known exploits are currently available, but the vulnerability is publicly disclosed and should be addressed promptly. The issue arises from improper bounds checking in the VMware Workstation code handling guest-host interactions, leading to reading memory outside intended boundaries. This could be leveraged by malicious insiders or attackers who gain guest VM access to gather information about the host environment, which might assist in further attacks or reconnaissance.

Potential Impact

The primary impact of CVE-2026-22717 is limited information disclosure from the host system to an attacker operating within a guest VM. This compromises confidentiality but does not affect integrity or availability. Organizations using VMware Workstation in environments where guest VMs are accessible to untrusted or semi-trusted users face a risk of sensitive host data leakage. Although the information disclosed is limited, it could aid attackers in crafting more targeted attacks or escalating privileges through other vulnerabilities. The requirement for local guest VM access and user interaction reduces the likelihood of widespread exploitation. However, in environments such as development, testing, or shared hosting where multiple users have guest VM access, the risk is more pronounced. Enterprises relying heavily on VMware Workstation for virtualization, especially those with sensitive host environments, should consider this vulnerability a security concern. The absence of known exploits in the wild currently limits immediate risk but does not preclude future exploitation attempts once details become widely known.

Mitigation Recommendations

To mitigate CVE-2026-22717, organizations should implement strict access controls to limit who can operate guest VMs, ensuring only trusted users have access. Disable or restrict features that allow guest-to-host communication unless absolutely necessary. Monitor guest VM activity for unusual behavior that could indicate exploitation attempts. Apply the principle of least privilege within guest VMs to reduce the potential impact of compromised guest accounts. VMware should be monitored for official patches or updates addressing this vulnerability, and these should be applied promptly once available. In the interim, consider isolating critical host systems from environments where untrusted guest VM users operate. Employ network segmentation and host-based intrusion detection systems to detect anomalous access patterns. Additionally, educate users about the risks of interacting with untrusted guest VMs and enforce policies to prevent unauthorized software execution within guest environments.

Need more detailed analysis?Upgrade to Pro Console

Technical Details

Data Version
5.2
Assigner Short Name
vmware
Date Reserved
2026-01-09T06:54:36.841Z
Cvss Version
3.1
State
PUBLISHED

Threat ID: 69a1efd332ffcdb8a269c8f8

Added to database: 2/27/2026, 7:26:11 PM

Last enriched: 2/27/2026, 7:44:03 PM

Last updated: 2/28/2026, 5:43:13 AM

Views: 8

Community Reviews

0 reviews

Crowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.

Sort by
Loading community insights…

Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.

Actions

PRO

Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.

Please log in to the Console to use AI analysis features.

Need more coverage?

Upgrade to Pro Console in Console -> Billing for AI refresh and higher limits.

For incident response and remediation, OffSeq services can help resolve threats faster.

Latest Threats

Breach by OffSeqOFFSEQFRIENDS — 25% OFF

Check if your credentials are on the dark web

Instant breach scanning across billions of leaked records. Free tier available.

Scan now
OffSeq TrainingCredly Certified

Lead Pen Test Professional

Technical5-day eLearningPECB Accredited
View courses