VMware Patches Critical RCE Flaws in vCenter and ESXi; Admins Urged to Update Immediately

VMware Patches Critical Remote Code Execution Vulnerabilities in vCenter Server and ESXi

CRITICAL
March 12, 2026
4m read
VulnerabilityPatch ManagementCloud Security

Related Entities

Organizations

Products & Tech

vCenter ServerESXi

CVE Identifiers

CVE-2024-22252
CRITICAL
CVSS:9.3
CVE-2024-22253
CRITICAL
CVSS:9.3
CVE-2024-22255
HIGH
CVSS:7.1

Full Report

Executive Summary

VMware has released critical security patches for its widely used vCenter Server and ESXi products, addressing vulnerabilities that could lead to full hypervisor compromise. The update fixes two critical heap-overflow vulnerabilities, CVE-2024-22252 and CVE-2024-22253, both rated with a CVSS score of 9.3. These flaws could allow an attacker with local administrative privileges on a virtual machine to execute code on the underlying ESXi host. A third high-severity privilege escalation flaw, CVE-2024-22255 (CVSS 7.1), was also patched. VMware has emphasized that there are no workarounds and urges administrators to apply the updates immediately.


Vulnerability Details

The most severe issues are CVE-2024-22252 and CVE-2024-22253. These are heap-overflow vulnerabilities found in the implementation of the XHCI and UHCI USB controllers within ESXi. An attacker who has already compromised a virtual machine and obtained administrative privileges within that VM can exploit these flaws.

By sending specially crafted data to the virtual USB controller, the attacker can trigger a heap overflow on the ESXi host. This can be leveraged to achieve a "VM escape," where the attacker breaks out of the isolated guest environment and gains the ability to execute arbitrary code directly on the hypervisor. A successful exploit would grant the attacker control over the ESXi host and all other virtual machines running on it.

CVE-2024-22255 is a privilege escalation vulnerability in vCenter Server. A malicious actor with network access to the vCenter appliance could potentially escalate their privileges, although the exact vector has not been detailed by VMware.

Affected Systems

  • VMware ESXi: Versions 7.0 and 8.0 are affected by CVE-2024-22252 and CVE-2024-22253.
  • VMware vCenter Server: Versions 7.0 and 8.0 are affected by CVE-2024-22255.
  • VMware Cloud Foundation: (Includes ESXi and vCenter Server) is also affected.

Patches are available for all affected versions. Administrators should consult VMware's security advisory VMSA-2024-00XX for specific patch details.

Exploitation Status

VMware has not reported any active exploitation of these vulnerabilities in the wild. However, vulnerabilities in VMware products are highly sought after by threat actors, including state-sponsored groups and ransomware gangs, due to the critical role these systems play in enterprise environments. The public disclosure will inevitably lead to reverse-engineering of the patches and the development of exploit code.

Impact Assessment

A compromise of an ESXi host is a catastrophic security event. The impact includes:

  • Total Infrastructure Compromise: The attacker gains control over the hypervisor and all VMs it hosts, including domain controllers, database servers, and critical application servers.
  • Mass Data Breach: Attackers can access, modify, or exfiltrate data from all virtual machines on the host.
  • Ransomware Deployment: Attackers can deploy ransomware across the entire virtualized environment simultaneously, causing widespread and devastating operational disruption.
  • Persistent Access: A compromised hypervisor provides a powerful and stealthy persistence mechanism, allowing attackers to maintain long-term control of the network.

Detection & Response

  • Vulnerability Scanning: Immediately scan your environment for all ESXi and vCenter instances and identify those that are vulnerable.
  • Log Monitoring: Monitor ESXi logs (/var/log/vmkernel.log) for unusual errors or crashes related to USB controller functions. In vCenter, monitor audit logs for unexpected or unauthorized administrative activity.
  • Network Traffic Analysis: Monitor for unusual network traffic originating from ESXi management interfaces or vCenter Server, especially connections to unknown external IP addresses. This could indicate a post-exploitation C2 channel.
  • D3FEND Techniques: Use D3-NTA: Network Traffic Analysis to baseline normal management traffic and detect anomalies. Implement D3-PA: Process Analysis on the hypervisor level if possible, though this is often challenging on closed systems like ESXi.

Mitigation

  1. Patch Immediately: This is the only effective mitigation. There are no workarounds. Prioritize patching internet-facing and business-critical ESXi hosts and their corresponding vCenter Servers.
  2. Restrict Access: Limit network access to the ESXi management interface and vCenter Server to only trusted administrators on a dedicated management network. Do not expose these interfaces to the public internet.
  3. Harden Virtual Machines: Apply security best practices to all guest VMs. A strong in-guest security posture makes it harder for an attacker to gain the initial foothold needed to launch the VM escape exploit.
  4. Disable USB Controllers: If USB devices are not required for a virtual machine, consider removing the virtual USB controller from the VM's configuration to reduce the attack surface. However, VMware has not confirmed this as a viable mitigation for these specific flaws.

Timeline of Events

1
March 12, 2026
This article was published

MITRE ATT&CK Mitigations

Applying the security patches released by VMware is the only way to fully remediate these vulnerabilities.

Mapped D3FEND Techniques:

Isolate vSphere management interfaces on a dedicated, hardened network segment, inaccessible from general user networks or the internet.

Mapped D3FEND Techniques:

If a virtual machine does not require USB functionality, removing the virtual USB controller can reduce its specific attack surface, though this is not a confirmed mitigation for this specific flaw.

Mapped D3FEND Techniques:

D3FEND Defensive Countermeasures

Given the critical nature of these vulnerabilities and the high value of ESXi hosts to attackers, organizations must treat this as an emergency patching situation. Utilize vSphere Lifecycle Manager (vLCM) to orchestrate the patching of ESXi hosts in a controlled manner, using maintenance mode to avoid service disruption. The vCenter Server should be patched first, as it is often a prerequisite for managing and patching the hosts. Due to the lack of workarounds, patching is the only viable defense. Any delay significantly increases the risk of a full data center compromise. Track compliance using your vulnerability management solution and aim for a 100% patched state within days, not weeks.

As a critical compensating control, organizations must enforce strict network isolation for all vSphere management interfaces (ESXi, vCenter). These interfaces should reside on a dedicated management VLAN or VRF that is only accessible from hardened administrator workstations or jump boxes. Implement strict firewall rules to deny all traffic to these interfaces by default, only allowing specific source IPs (e.g., from the management subnet) on required ports (e.g., TCP 443, 902). Under no circumstances should these management interfaces be exposed to the internet. This architectural control drastically reduces the attack surface for flaws like CVE-2024-22255 and makes it harder for attackers to reach the hypervisor even if they compromise another part of the network.

Sources & References

Article Author

Jason Gomes

Jason Gomes

• Cybersecurity Practitioner

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.

Threat Intelligence & AnalysisSecurity Orchestration (SOAR/XSOAR)Incident Response & Digital ForensicsSecurity Operations Center (SOC)SIEM & Security AnalyticsCyber Fusion & Threat SharingSecurity Automation & IntegrationManaged Detection & Response (MDR)

Tags

VMwareESXivCenterCVE-2024-22252CVE-2024-22253RCEVM EscapeVirtualization

📢 Share This Article

Help others stay informed about cybersecurity threats