CVE-2026-22715

Plain English Summary

AI-powered analysis for quick understanding

An attacker with administrative access on one virtual machine (VM) can disrupt or eavesdrop on the network connections of other VMs on the same host. To fix this issue, users need to upgrade to the latest version of VMware Workstation or Fusion.

Technical Description

VMWare Workstation and Fusion contain a logic flaw in the management of network packets.  Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM's.  Resolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1

CVSS Vector Analysis

Attack VectorAdjacent Network
Attack ComplexityHigh
Privileges RequiredNone
User InteractionNone
Confidentiality ImpactNone
Integrity ImpactHigh
Availability ImpactLow
ScopeUnchanged

Vector String

CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L

Exploit Resources

Search for proof-of-concept code and exploit modules

Official References

Est. Bounty
$828($500-$1K)
Vendor Response
Grade APatched in 0 days

Quick Information

Published

Feb 26, 2026

about 1 month ago

Last Modified

Feb 27, 2026

about 1 month ago