VMware ESXi (7.0, 6.7 before ESXi670-202111101-SG and 6.5 before ESXi650-202110101-SG), VMware Workstation (16.2.0) and VMware Fusion (12.2.0) contains a heap-overflow vulnerability in CD-ROM device emulation. A malicious actor with access to a virtual machine with CD-ROM device emulation may be able to exploit this vulnerability in conjunction with other issues to execute code on the hypervisor from a virtual machine.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html | Third Party Advisory VDB Entry |
https://www.vmware.com/security/advisories/VMSA-2022-0001.html | Vendor Advisory |
https://www.zerodayinitiative.com/advisories/ZDI-22-003/ | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
AND |
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
27 Jan 2022, 17:40
Type | Values Removed | Values Added |
---|---|---|
CPE |
26 Jan 2022, 15:51
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:vmware:cloud_foundation:3.0:-:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:macos:*:* |
cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1c:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202011002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1d:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202102003:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202107401:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202103001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1a:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202010001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202102001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202011001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202111001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:* cpe:2.3:o:apple:mac_os_x:-:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202011002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202102002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:beta:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-202011001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201911001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_1b:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:update_2a:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:650-202102001:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:* |
07 Jan 2022, 16:22
Type | Values Removed | Values Added |
---|---|---|
References | (MISC) http://packetstormsecurity.com/files/165440/VMware-Security-Advisory-2022-0001.html - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.zerodayinitiative.com/advisories/ZDI-22-003/ - Third Party Advisory, VDB Entry | |
References | (MISC) https://www.vmware.com/security/advisories/VMSA-2022-0001.html - Vendor Advisory | |
CWE | CWE-787 | |
CPE | cpe:2.3:a:vmware:cloud_foundation:3.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:7.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:* cpe:2.3:a:vmware:cloud_foundation:4.0:-:*:*:*:*:*:* cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:* cpe:2.3:a:vmware:fusion:*:*:*:*:*:macos:*:* cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:* |
|
CVSS |
v2 : v3 : |
v2 : 6.9
v3 : 7.8 |
06 Jan 2022, 15:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
05 Jan 2022, 19:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
04 Jan 2022, 22:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-01-04 22:15
Updated : 2024-02-04 22:08
NVD link : CVE-2021-22045
Mitre link : CVE-2021-22045
CVE.ORG link : CVE-2021-22045
JSON object : View
Products Affected
vmware
- cloud_foundation
- esxi
- workstation
- fusion
apple
- mac_os_x
CWE
CWE-787
Out-of-bounds Write