CVE-2026-22722: CWE-476 NULL Pointer Dereference in VMware Workstation
A malicious actor with authenticated user privileges on a Windows based Workstation host may be able to cause a null pointer dereference error. To Remediate CVE-2026-22722, apply the patches listed in the "Fixed version" column of the 'Response Matrix'
AI Analysis
Technical Summary
CVE-2026-22722 is a vulnerability identified in VMware Workstation version 17.0 running on Windows-based hosts. The issue is classified as a CWE-476 NULL Pointer Dereference, which occurs when the software attempts to access or dereference a pointer that has a null value, leading to a crash or denial of service condition. An attacker with authenticated user privileges on the host system can trigger this flaw without requiring additional user interaction. The vulnerability does not expose sensitive data or allow privilege escalation but can cause the VMware Workstation application to crash, impacting availability. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H, meaning local attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. While no exploits have been reported in the wild, the vulnerability poses a risk to environments where VMware Workstation is used for virtualization on Windows hosts. VMware has released patches to address this issue, and users are advised to apply them promptly. The flaw highlights the importance of robust pointer handling in virtualization software to prevent denial of service conditions that could disrupt business operations.
Potential Impact
The primary impact of CVE-2026-22722 is on the availability of VMware Workstation on affected Windows hosts. An authenticated user can cause the application to crash by triggering a null pointer dereference, resulting in denial of service. This could disrupt development, testing, or operational workflows that rely on VMware Workstation for virtualization. Although the vulnerability does not compromise confidentiality or allow privilege escalation, the loss of availability can lead to productivity losses and potential operational delays. Organizations with multiple users having authenticated access to workstations running VMware Workstation 17.0 are at increased risk of accidental or intentional disruption. In environments where VMware Workstation hosts critical virtual machines, this could impact business continuity. Since exploitation requires local authenticated access, remote attackers cannot exploit this vulnerability directly, limiting its scope. However, insider threats or compromised user accounts could leverage this flaw to cause disruption. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for timely patching.
Mitigation Recommendations
To mitigate CVE-2026-22722, organizations should immediately apply the official patches provided by VMware as listed in their response matrix for VMware Workstation 17.0. Beyond patching, organizations should enforce strict access controls to limit authenticated user privileges on Windows hosts running VMware Workstation, minimizing the number of users who can trigger the vulnerability. Implementing endpoint monitoring to detect abnormal VMware Workstation crashes or service interruptions can help identify exploitation attempts or accidental triggers. Regularly auditing user accounts and their permissions on host systems will reduce the risk of insider threats exploiting this vulnerability. Additionally, organizations should educate users about the risks of causing application crashes and encourage reporting of any unusual workstation behavior. Maintaining up-to-date backups of virtual machines can help recover quickly from any disruption caused by denial of service. Finally, integrating VMware Workstation hosts into broader vulnerability management and patching workflows ensures timely updates and reduces exposure windows.
Affected Countries
United States, Germany, United Kingdom, Japan, Canada, Australia, France, Netherlands, South Korea, India
CVE-2026-22722: CWE-476 NULL Pointer Dereference in VMware Workstation
Description
A malicious actor with authenticated user privileges on a Windows based Workstation host may be able to cause a null pointer dereference error. To Remediate CVE-2026-22722, apply the patches listed in the "Fixed version" column of the 'Response Matrix'
AI-Powered Analysis
Machine-generated threat intelligence
Technical Analysis
CVE-2026-22722 is a vulnerability identified in VMware Workstation version 17.0 running on Windows-based hosts. The issue is classified as a CWE-476 NULL Pointer Dereference, which occurs when the software attempts to access or dereference a pointer that has a null value, leading to a crash or denial of service condition. An attacker with authenticated user privileges on the host system can trigger this flaw without requiring additional user interaction. The vulnerability does not expose sensitive data or allow privilege escalation but can cause the VMware Workstation application to crash, impacting availability. The CVSS v3.1 base score is 6.1, indicating a medium severity level, with the vector AV:L/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:H, meaning local attack vector, low attack complexity, requires privileges, no user interaction, unchanged scope, no confidentiality impact, low integrity impact, and high availability impact. While no exploits have been reported in the wild, the vulnerability poses a risk to environments where VMware Workstation is used for virtualization on Windows hosts. VMware has released patches to address this issue, and users are advised to apply them promptly. The flaw highlights the importance of robust pointer handling in virtualization software to prevent denial of service conditions that could disrupt business operations.
Potential Impact
The primary impact of CVE-2026-22722 is on the availability of VMware Workstation on affected Windows hosts. An authenticated user can cause the application to crash by triggering a null pointer dereference, resulting in denial of service. This could disrupt development, testing, or operational workflows that rely on VMware Workstation for virtualization. Although the vulnerability does not compromise confidentiality or allow privilege escalation, the loss of availability can lead to productivity losses and potential operational delays. Organizations with multiple users having authenticated access to workstations running VMware Workstation 17.0 are at increased risk of accidental or intentional disruption. In environments where VMware Workstation hosts critical virtual machines, this could impact business continuity. Since exploitation requires local authenticated access, remote attackers cannot exploit this vulnerability directly, limiting its scope. However, insider threats or compromised user accounts could leverage this flaw to cause disruption. The absence of known exploits in the wild reduces immediate risk but does not eliminate the need for timely patching.
Mitigation Recommendations
To mitigate CVE-2026-22722, organizations should immediately apply the official patches provided by VMware as listed in their response matrix for VMware Workstation 17.0. Beyond patching, organizations should enforce strict access controls to limit authenticated user privileges on Windows hosts running VMware Workstation, minimizing the number of users who can trigger the vulnerability. Implementing endpoint monitoring to detect abnormal VMware Workstation crashes or service interruptions can help identify exploitation attempts or accidental triggers. Regularly auditing user accounts and their permissions on host systems will reduce the risk of insider threats exploiting this vulnerability. Additionally, organizations should educate users about the risks of causing application crashes and encourage reporting of any unusual workstation behavior. Maintaining up-to-date backups of virtual machines can help recover quickly from any disruption caused by denial of service. Finally, integrating VMware Workstation hosts into broader vulnerability management and patching workflows ensures timely updates and reduces exposure windows.
Technical Details
- Data Version
- 5.2
- Assigner Short Name
- vmware
- Date Reserved
- 2026-01-09T06:54:36.841Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 69a0a1b885912abc71d0a0b1
Added to database: 2/26/2026, 7:40:40 PM
Last enriched: 3/5/2026, 9:15:56 PM
Last updated: 4/13/2026, 9:25:33 AM
Views: 87
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Actions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
External Links
Need more coverage?
Upgrade to Pro Console for AI refresh and higher limits.
For incident response and remediation, OffSeq services can help resolve threats faster.
Latest Threats
Check if your credentials are on the dark web
Instant breach scanning across billions of leaked records. Free tier available.