www.vmware.com Open in urlscan Pro
2a02:26f0:3500:89b::2ef  Public Scan

URL: https://www.vmware.com/security/advisories/VMSA-2024-0006.html
Submission: On March 11 via api from IN — Scanned from DE

Form analysis 3 forms found in the DOM

//www.vmware.com/search-redesign.html

<form action="//www.vmware.com/search-redesign.html" id="globalsearch" class="wrapperSearch">
  <input type="text" name="q" id="ub-search" class="d-none" placeholder="Search" title="Search" aria-role="searchbox" role="searchbox">
  <a href="javascript:void(0);" aria-label="Search vmware.com" class="search-icon ml-lg-3" name="nav_utility : Search">

																<i class="fa fa-search text-indigo mr-2 mr-lg-0" aria-hidden="true"></i>
															</a>
  <div class="search-auto-fill d-none">
    <span>SUGGESTED SEARCHES</span>
    <div class="search-auto-fill-option"></div>
  </div>
  <input type="hidden" name="num" value="20">
  <input type="hidden" name="filter" value="0">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="hidden" name="oe" value="UTF-8">
  <input type="hidden" name="entqr" value="0">
  <input type="hidden" name="start" value="0">
  <input type="hidden" name="sort" value="">
  <input type="hidden" name="tlen" value="200">
  <input type="hidden" name="numgm" value="3">
  <input type="hidden" name="cn" value="vmware">
  <input type="hidden" name="cid" value="">
  <input type="hidden" name="tid" value="">
  <input type="hidden" name="getfields" value="*">
  <input type="hidden" name="partialfields" value="">
  <input type="hidden" name="requiredfields" value="">
  <input type="hidden" name="place" value="top">
  <input type="hidden" name="client" value="VMware_Site_1">
  <input type="hidden" name="site" value="VMware_Site_1">
  <input type="hidden" name="cc" value="en">
  <input type="hidden" name="stype" value="main">
</form>

//www.vmware.com/search-redesign.html

<form action="//www.vmware.com/search-redesign.html" id="globalsearch" class="wrapperSearch">
  <a href="javascript:void(0);" tabindex="-1" class="search-icon ml-lg-3" name="nav_utility : Search">
         </a>
  <input type="text" name="q" id="ub-search" placeholder="Search" title="Search" role="searchbox">
  <a href="javascript:void(0);" aria-label="Close Search" class="close-icon closeIconSearchComp ml-lg-3" name="nav_utility : Close" link-name="Close">
            </a>
  <input type="hidden" name="num" value="20">
  <input type="hidden" name="filter" value="0">
  <input type="hidden" name="ie" value="UTF-8">
  <input type="hidden" name="oe" value="UTF-8">
  <input type="hidden" name="entqr" value="0">
  <input type="hidden" name="start" value="0">
  <input type="hidden" name="sort" value="">
  <input type="hidden" name="tlen" value="200">
  <input type="hidden" name="numgm" value="3">
  <input type="hidden" name="cn" value="vmware">
  <input type="hidden" name="cid" value="">
  <input type="hidden" name="tid" value="">
  <input type="hidden" name="getfields" value="*">
  <input type="hidden" name="partialfields" value="">
  <input type="hidden" name="requiredfields" value="">
  <input type="hidden" name="place" value="top">
  <input type="hidden" name="client" value="VMware_Site_1">
  <input type="hidden" name="site" value="VMware_Site_1">
  <input type="hidden" name="cc" value="en">
  <input type="hidden" name="stype" value="main">
</form>

Name: securitysignup

<form accept-charset="UNKNOWN" id="securitysignup" name="securitysignup" data-gtm-form-interact-id="0">
  <label class="email-input-label" for="securityEmail">*Email</label>
  <input id="securityEmail" name="email" size="25" type="text" data-gtm-form-interact-field-id="0">
  <span class="subscriptionerrorMsg sa-validation-alerts" tabindex="0"></span>
  <input name="email-button" class="sa-subscription-modal-button sa-subscription-submit-button" type="submit" onclick="s_objectID='content_advisories :  : 0';" value="Submit">
</form>

Text Content

Skip to Promo Skip to main content
Global Search
SUGGESTED SEARCHES

Store
Login
Cloud Services Console Customer Connect Partner Connect
 * Products
 * Solutions
 * Partners
 * Resources

Main Menu
Cloud Services Console Customer Connect Partner Connect
Search
CONTACT SALES
Global Search

SUGGESTED SEARCHES

Main Menu

ANYWHERE WORKSPACE

Access Any App on Any Device Securely

 * Horizon
 * Horizon Cloud
 * Workspace ONE
 * Workspace ONE UEM

APP PLATFORM

Build and Operate Cloud Native Apps

 * Tanzu

CLOUD & EDGE INFRASTRUCTURE

Run Enterprise Apps Anywhere

 * Cloud Foundation
 * SD-WAN/SASE
 * Telco Cloud
 * vSAN
 * vSphere
 * VMware Cloud Disaster Recovery

CLOUD MANAGEMENT

Automate and Optimize Apps and Clouds

 * VMware Aria
 * CloudHealth
 * Skyline

DESKTOP HYPERVISOR

Manage apps in a local virtualization sandbox

 * Fusion for Mac
 * Workstation Player
 * Workstation Pro

SECURITY & NETWORKING

Connect and Secure Apps and Clouds

 * Carbon Black Cloud
 * Carbon Black Endpoint
 * NSX
 * NSX Advanced Load Balancer
 * NSX Distributed Firewall

RUN VMWARE ON ANY CLOUD. ANY ENVIRONMENT. ANYWHERE.

ON PUBLIC & HYBRID CLOUDS

 * Alibaba Cloud VMware Service
 * Azure VMware Solution
 * Google Cloud VMware Engine
 * IBM Cloud for VMware Solutions
 * Oracle Cloud VMware Solutions
 * VMware Cloud on AWS
 * VMware Cloud on AWS GovCloud (US)

ON PRIVATE & LOCAL CLOUDS

 * Dell EMC VxRail
 * VMware Cloud on Equinix Metal
 * VMware on AWS Outposts
 * VMware Verified Cloud Providers


SEE ALL PRODUCTS
 * SaaS (Subscription) product version available

Main Menu

SOLUTIONS

ANYWHERE WORKSPACE

ACCESS ANY APP ON ANY DEVICE SECURELY

APP PLATFORM

BUILD AND OPERATE CLOUD NATIVE APPS

CLOUD INFRASTRUCTURE

RUN ENTERPRISE APPS ANYWHERE

CLOUD MANAGEMENT

AUTOMATE AND OPTIMIZE APPS AND CLOUDS

EDGE INFRASTRUCTURE

ENABLE THE MULTI-CLOUD EDGE

NETWORKING

ENABLE CONNECTIVITY FOR APPS AND CLOUDS

SECURITY

SECURE APPS AND CLOUDS

BY INDUSTRY

 * Communications Service Providers
 * Department of Defense
 * Federal Government
 * Financial Services
 * Healthcare Providers
 * State and Local Government

VMWARE AI SOLUTIONS

Accelerate and ensure the success of your generative AI initiatives with
multi-cloud flexibility, choice, privacy and control.

LEARN MORE

SEE ALL SOLUTIONS SEE ALL INDUSTRIES
Main Menu

FOR CUSTOMERS

 * Find a Cloud Provider
 * Find a Partner
 * VMware Marketplace
 * Work with a Partner

FOR PARTNERS

 * Become a Cloud Provider
 * Cloud Partner Navigator
 * Get Cloud Verified
 * Learning and Selling Resources
 * Partner Connect Login
 * Partner Executive Edge
 * Technology Partner Hub
 * Work with VMware

WORKING TOGETHER WITH PARTNERS FOR CUSTOMER SUCCESS

A new, simplified partner program to help achieve even greater opportunities for
profitability.

READ NEW PARTNER FAQ

Main Menu

TOOLS & TRAINING

 * VMware Customer Connect
 * VMware Trust Center
 * Learning & Certification
 * Tech Zone
 * Product Downloads
 * Product Trials
 * Cloud Services Engagement Platform
 * Hands-on Labs

SERVICES

 * Professional Services
 * Customer Success

SUPPORT

 * VMware Customer Connect
 * Support Offerings
 * Skyline
 * Support Customer Welcome Center

MARKETPLACE

 * Cloud Marketplace
 * VMware Marketplace

VIDEOS

 * VMware Video Library
 * VMware Explore Video Library

BLOGS & COMMUNITIES

 * Blogs
 * Podcasts
 * News & Stories
 * Communities

CUSTOMERS

 * Customer Stories

EVENTS

 * VMware Explore
 * SpringOne
 * All Events & Webcasts


SEE ALL RESOURCES
Ellipsis
VMware Security Solutions  Advisories  VMSA-2024-0006.1



Critical

Advisory ID: VMSA-2024-0006.1
CVSSv3 Range: 7.1-9.3
Issue Date: 2024-03-05
Updated On: 2024-03-05
CVE(s): CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255
Synopsis: VMware ESXi, Workstation, and Fusion updates address multiple security
vulnerabilities (CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255)

RSS Feed

Download PDF

Download Text File

Share this page on social media:



Sign up for Security Advisories

SIGN UP FOR SECURITY ADVISORIES

Stay up to date on the latest VMware Security advisories and updates.





Close
*Email

1. IMPACTED PRODUCTS

 * VMware ESXi
 * VMware Workstation Pro / Player (Workstation)
 * VMware Fusion Pro / Fusion (Fusion)
 * VMware Cloud Foundation (Cloud Foundation)
   

2. INTRODUCTION


Multiple vulnerabilities in VMware ESXi, Workstation, and Fusion were privately
reported to VMware. Updates are available to remediate these vulnerabilities in
affected VMware products.

The individual vulnerabilities documented on this VMSA for ESXi have severity
Important but combining these issues will result in Critical severity.

3A. USE-AFTER-FREE VULNERABILITY IN XHCI USB CONTROLLER (CVE-2024-22252)

Description

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in
the XHCI USB controller. VMware has evaluated the severity of this issue to be
in the Critical severity range with a maximum CVSSv3 base score of 9.3 for
Workstation/Fusion and in the Important severity range with a maximum CVSSv3
base score of 8.4 for ESXi.

Known Attack Vectors

A malicious actor with local administrative privileges on a virtual machine may
exploit this issue to execute code as the virtual machine's VMX process running
on the host. On ESXi, the exploitation is contained within the VMX sandbox
whereas, on Workstation and Fusion, this may lead to code execution on the
machine where Workstation or Fusion is installed.

Resolution

To remediate CVE-2024-22252 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.

Workarounds

Workarounds for CVE-2024-22252 have been listed in the 'Workarounds' column of
the 'Response Matrix' below.


Additional Documentation

A supplemental FAQ was created for clarification. Please see:
https://core.vmware.com/resource/vmsa-2024-0006-questions-answers


Notes

None.


Acknowledgements

VMware would like to thank Jiang YuHao, Ying XingLei & Zhang ZiMing of Team Ant
Lab working with the 2023 Tianfu Cup Pwn Contest and Jiaqing Huang (@s0duku) &
Hao Zheng (@zhz) from TianGong Team of Legendsec at Qi'anxin Group for
independently reporting this issue to us.


3B. USE-AFTER-FREE VULNERABILITY IN UHCI USB CONTROLLER (CVE-2024-22253)

Description

VMware ESXi, Workstation, and Fusion contain a use-after-free vulnerability in
the UHCI USB controller. VMware has evaluated the severity of this issue to be
in the Critical severity range with a maximum CVSSv3 base score of 9.3 for
Workstation/Fusion and in the Important severity range with a maximum CVSSv3
base score of 8.4 for ESXi.

Known Attack Vectors

A malicious actor with local administrative privileges on a virtual machine may
exploit this issue to execute code as the virtual machine's VMX process running
on the host. On ESXi, the exploitation is contained within the VMX sandbox
whereas, on Workstation and Fusion, this may lead to code execution on the
machine where Workstation or Fusion is installed.

Resolution

To remediate CVE-2024-22253 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.


Workarounds

Workarounds for CVE-2024-22253 have been listed in the 'Workarounds' column of
the 'Response Matrix' below.


Additional Documentation

A supplemental FAQ was created for clarification. Please see:
https://core.vmware.com/resource/vmsa-2024-0006-questions-answers


Notes

None.

Acknowledgements

VMware would like to thank VictorV and Wei of Team CyberAgent working with the
2023 Tianfu Cup Pwn Contest for reporting this issue to us.


3C. ESXI OUT-OF-BOUNDS WRITE VULNERABILITY (CVE-2024-22254)

Description

VMware ESXi contains an out-of-bounds write vulnerability. VMware has evaluated
the severity of this issue to be in the Important severity range with a maximum
CVSSv3 base score of 7.9.

Known Attack Vectors

A malicious actor with privileges within the VMX process may trigger an
out-of-bounds write leading to an escape of the sandbox.

Resolution

To remediate CVE-2024-22254 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.


Workarounds

None.

Additional Documentation

A supplemental FAQ was created for clarification. Please see:
https://core.vmware.com/resource/vmsa-2024-0006-questions-answers


Notes

None.

Acknowledgements

VMware would like to thank Jiang YuHao, Ying XingLei & Zhang ZiMing of Team Ant
Lab working with the 2023 Tianfu Cup Pwn Contest for reporting this issue to us.


3D. INFORMATION DISCLOSURE VULNERABILITY IN UHCI USB CONTROLLER (CVE-2024-22255)

Description

VMware ESXi, Workstation, and Fusion contain an information disclosure
vulnerability in the UHCI USB controller. VMware has evaluated the severity of
this issue to be in the Important severity range with a maximum CVSSv3 base
score of 7.1.

Known Attack Vectors

A malicious actor with administrative access to a virtual machine may be able to
exploit this issue to leak memory from the vmx process.  

Resolution

To remediate CVE-2024-22255 apply the patches listed in the 'Fixed Version'
column of the 'Response Matrix' found below.


Workarounds

Workarounds for CVE-2024-22255 have been listed in the 'Workarounds' column of
the 'Response Matrix' below.

Additional Documentation

A supplemental FAQ was created for clarification. Please see:
https://core.vmware.com/resource/vmsa-2024-0006-questions-answers


Notes

None.

Acknowledgements

VMware would like to thank VictorV & Wei of Team CyberAgent working with the
2023 Tianfu Cup Pwn Contest Contest and Jiaqing Huang (@s0duku) & Hao Zheng
(@zhz) from TianGong Team of Legendsec at Qi'anxin Group for independently
reporting this issue to us.


Response Matrix:

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version [1]
Workarounds Additional Documentation
ESXi
8.0
Any
CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255
8.4, 8.4, 7.9, 7.1
critical
ESXi80U2sb-23305545
KB96682
FAQ
ESXi
8.0 [2]
Any
CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255
8.4, 8.4, 7.9, 7.1
critical
ESXi80U1d-23299997
KB96682
FAQ
ESXi
7.0
Any
CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255
8.4, 8.4, 7.9, 7.1
critical
ESXi70U3p-23307199
KB96682
FAQ
Workstation
17.x
Any
CVE-2024-22252, CVE-2024-22253, CVE-2024-22255
9.3, 9.3, 7.1
critical
17.5.1
KB96682
None.
Fusion
13.x
MacOS
CVE-2024-22252, CVE-2024-22253, CVE-2024-22255
9.3, 9.3, 7.1
critical
13.5.1
KB96682
None

[1] While Broadcom does not mention end-of-life products in the Security
Advisories, due to the critical severity of these vulnerabilities Broadcom has
made a patch available to customers with extended support for ESXi 6.7 (6.7U3u),
6.5 (6.5U3v) and VCF 3.x.

[2] Because of the severity of these issues, Broadcom has made additional
patches available for ESXi 8.0 U1. If you do not plan to update your environment
to ESXi 8.0 Update 2b (build # 23305546), use 8.0 Update 1d to update your ESXi
hosts of version 8.0 Update 1c (build # 22088125) and earlier for these security
fixes. The supported update path from 8.0 Update 1d is to ESXi 8.0 Update 2b or
later. For more information, see the Product Interoperability Matrix.

Impacted Product Suites that Deploy Response Matrix Components:

Product Version Running On CVE Identifier CVSSv3 Severity Fixed Version
Workarounds Additional Documentation
Cloud Foundation (ESXi)
5.x/4.x
Any
CVE-2024-22252, CVE-2024-22253, CVE-2024-22254, CVE-2024-22255
8.4, 8.4, 7.9, 7.1
critical
KB88287
KB96682
FAQ

4. REFERENCES

VMware ESXi 8.0 ESXi-8.0U2sb-23305545
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-esxi-80u2b-release-notes/index.html


VMware ESXi 8.0 ESXi80U1d-23299997
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/8.0/rn/vsphere-esxi-80u1d-release-notes/index.html

VMware ESXi 7.0 ESXi70U3p-23307199
https://my.vmware.com/group/vmware/patch
https://docs.vmware.com/en/VMware-vSphere/7.0/rn/vsphere-esxi-70u3p-release-notes/index.html

Workstation Pro 17.5.1
Downloads and Documentation
https://customerconnect.vmware.com/downloads/info/slug/desktop_end_user_computing/vmware_workstation_pro/17_0
https://docs.vmware.com/en/VMware-Workstation-Pro/17.5.1/rn/vmware-workstation-1751-pro-release-notes/index.html

Fusion 13.5.1
Downloads and Documentation
https://customerconnect.vmware.com/en/downloads/info/slug/desktop_end_user_computing/vmware_fusion/13_0
https://docs.vmware.com/en/VMware-Fusion/13.5.1/rn/vmware-fusion-1351-release-notes/index.html

VMware Cloud Foundation 5.x/4.x
Downloads and Documentation:
https://kb.vmware.com/s/article/88287

Mitre CVE Dictionary Links:
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22252 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22253 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22254 
https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-22255


FIRST CVSSv3 Calculator:
CVE-2024-22252:
ESXi: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Workstation/Fusion: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2024-22253: 
ESXi: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Workstation/Fusion: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H

CVE-2024-22254: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:N

CVE-2024-22255: https://www.first.org/cvss/calculator/3.1#CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:N/A:N

5. CHANGE LOG

2024-03-05 VMSA-2024-0006
Initial security advisory.

2024-03-05 VMSA-2024-0006.1
Corrected severity for ESXi and VCF in the response matrix.


6. CONTACT

E-mail: security@vmware.com

PGP key at:
https://kb.vmware.com/kb/1055 

VMware Security Advisories
https://www.vmware.com/security/advisories 

VMware Security Response Policy
https://www.vmware.com/support/policies/security_response.html 

VMware Lifecycle Support Phases
https://www.vmware.com/support/policies/lifecycle.html 

VMware Security & Compliance Blog  
https://blogs.vmware.com/security 

Twitter
https://twitter.com/VMwareSRC

 

Copyright 2024 Broadcom. All rights reserved.
 


Company

 * About Us
 * Executive Leadership
 * News & Stories
 * Investor Relations
 * Customer Stories
 * Diversity, Equity & Inclusion
 * Environment, Social & Governance
 * AI at VMware

 * Careers
 * Blogs
 * Communities
 * Acquisitions
 * Office Locations
 * VMware Cloud Trust Center
 * COVID-19 Resources

Support

 * VMware Customer Connect
 * Support Policies
 * Product Documentation
 * Compatibility Guide
 * Terms & Conditions
 * California Transparency Act Statement
 * Hands-on Labs & Trials

 * Twitter
 * YouTube
 * Facebook
 * LinkedIn
 * Contact Sales

--------------------------------------------------------------------------------

Copyright © 2005-2024 Broadcom. All Rights Reserved. The term “Broadcom” refers
to Broadcom Inc. and/or its subsidiaries. Terms of Use Your California Privacy
Rights Privacy Accessibility Trademarks Glossary Help Feedback
Cookies Settings




WE CARE ABOUT YOUR PRIVACY

We use cookies to provide you with the best experience on our website, to
improve usability and performance and thereby improve what we offer to you. Our
website may also use third-party cookies to display advertising that is more
relevant to you. If you want to know more about how we use cookies, please see
our Cookie Policy.
Cookies Settings Reject All Accept All Cookies



COOKIE PREFERENCE CENTER




 * GENERAL INFORMATION ON COOKIES


 * STRICTLY NECESSARY


 * PERFORMANCE


 * FUNCTIONAL


 * ADVERTISING

GENERAL INFORMATION ON COOKIES

When you visit our website, we use cookies to ensure that we give you the best
experience. This information does not usually directly identify you, but it can
give you a more personalized web experience. Because we respect your right to
privacy, you can choose not to allow some types of cookies by clicking on the
different category headings to find out more and change your settings. However,
blocking some types of cookies may impact your experience on the site and the
services we are able to offer. Further information can be found in our
Cookie Policy.

STRICTLY NECESSARY

Always Active

Strictly necessary cookies are always enabled since they are essential for our
website to function. They enable core functionality such as security, network
management, and website accessibility. You can set your browser to block or
alert you about these cookies, but this may affect how the website functions.
For more information please visit www.aboutcookies.org or
www.allaboutcookies.org.

Cookies Details‎

PERFORMANCE

Performance


Performance cookies are used to analyze the user experience to improve our
website by collecting and reporting information on how you use it. They allow us
to know which pages are the most and least popular, see how visitors move around
the site, optimize our website and make it easier to navigate.

Cookies Details‎

FUNCTIONAL

Functional


Functional cookies help us keep track of your past browsing choices so we can
improve usability and customize your experience. These cookies enable the
website to remember your preferred settings, language preferences, location and
other customizable elements such as font or text size. If you do not allow these
cookies, then some or all of these services may not function properly.

Cookies Details‎

ADVERTISING

Advertising


Advertising cookies are used to send you relevant advertising and promotional
information. They may be set through our site by third parties to build a
profile of your interests and show you relevant advertisements on other sites.
These cookies do not directly store personal information, but their function is
based on uniquely identifying your browser and internet device.

Cookies Details‎
Back Button


COOKIE LIST

Filter Button
Consent Leg.Interest
checkbox label label
checkbox label label
checkbox label label

Clear
checkbox label label
Apply Cancel
Confirm My Choices
Reject All Allow All

word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word word word word word word word word word
word word word word word word word word

mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1
mmMwWLliI0fiflO&1