Description
VMWare Workstation and Fusion contain a logic flaw in the management of network packets. 

Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM's. 

Resolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1
Published: 2026-02-26
Score: 5.9 Medium
EPSS: < 1% Very Low
KEV: No
Impact: Network Interception / Disruption
Action: Upgrade
AI Analysis

Impact

Vulnerability in VMware Workstation and Fusion arises from a logic flaw in how the software manages network packets, a weakness identified as CWE-923. This flaw enables a malicious actor who has administrative privileges within a Guest virtual machine to interrupt or intercept the network connections of other Guest VMs on the same host. The misuse of packet handling can lead to service disruption or the unauthorized takedown of traffic between guests, exposing data exchange and potentially harming availability for the affected virtual machines.

Affected Systems

The flaw impacts VMware Fusion and VMware Workstation products. All currently supported versions released before version 25H2U1 are potentially affected, as the advisory does not list any specific version range but specifies that the fix is included in 25H2U1. VMware did not enumerate affected minor releases, so administrators should assume all earlier builds are vulnerable.

Risk and Exploitability

The CVSS score of 5.9 indicates a moderate risk. The EPSS score of less than 1 % suggests a very low probability of exploitation in the general population. VMware has not listed this issue in the CISA KEV catalog, so there is no known active exploitation campaign. Exploitation requires that the attacker runs as an administrator inside a Guest VM, so they must already have control over that VM. The attack vector is local to the host, with the attacker able to hijack traffic routes between guests, potentially enabling denial of service or passive data interception. Overall, the risk is moderate but limited by the attacker’s need for elevated VM privileges.

Generated by OpenCVE AI on April 18, 2026 at 10:22 UTC.

Remediation

Vendor Solution

To remediate CVE-2026-22715 please upgrade to VMwate Workstation or Fusion Version 25H2U1


OpenCVE Recommended Actions

  • Apply VMware's official upgrade to Workstation or Fusion version 25H2U1 or later to eliminate the logic flaw in packet handling.
  • Limit administrative rights within guest virtual machines to reduce the likelihood that an attacker can utilize the vulnerability to affect other guests.
  • If an upgrade cannot be performed immediately, consider disabling NAT networking for guest VMs or moving critical guests to isolated networks to prevent cross‑VM traffic manipulation.

Generated by OpenCVE AI on April 18, 2026 at 10:22 UTC.

Tracking

Sign in to view the affected projects.

Advisories

No advisories yet.

History

Fri, 27 Feb 2026 18:15:00 +0000

Type Values Removed Values Added
Weaknesses CWE-923
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


Fri, 27 Feb 2026 09:15:00 +0000

Type Values Removed Values Added
First Time appeared Vmware
Vmware fusion
Vmware workstation
Vendors & Products Vmware
Vmware fusion
Vmware workstation

Thu, 26 Feb 2026 19:15:00 +0000

Type Values Removed Values Added
Description VMWare Workstation and Fusion contain a logic flaw in the management of network packets.  Known attack vectors: A malicious actor with administrative privileges on a Guest VM may be able to interrupt or intercept network connections of other Guest VM's.  Resolution: To remediate CVE-2026-22715 please upgrade to VMware Workstation or Fusion Version 25H2U1
Title VMware Workstation/Fusion NAT vulnerability
References
Metrics cvssV3_1

{'score': 5.9, 'vector': 'CVSS:3.1/AV:A/AC:H/PR:N/UI:N/S:U/C:N/I:H/A:L'}


Subscriptions

Vmware Fusion Workstation
cve-icon MITRE

Status: PUBLISHED

Assigner: vmware

Published:

Updated: 2026-02-27T17:55:10.640Z

Reserved: 2026-01-09T06:54:36.840Z

Link: CVE-2026-22715

cve-icon Vulnrichment

Updated: 2026-02-27T17:54:58.149Z

cve-icon NVD

Status : Deferred

Published: 2026-02-26T19:32:37.893

Modified: 2026-04-15T00:35:42.020

Link: CVE-2026-22715

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

Updated: 2026-04-18T10:30:35Z

Weaknesses