Lucene search

K
cvelistVmwareCVELIST:CVE-2023-20895
HistoryJun 22, 2023 - 11:57 a.m.

CVE-2023-20895

2023-06-2211:57:15
vmware
www.cve.org
4
vmware
vcenter server
memory corruption
dcerpc protocol
authentication bypass

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.002

Percentile

53.9%

The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.

CNA Affected

[
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux",
      "Android",
      "x86",
      "ARM",
      "64 bit",
      "32 bit",
      "MacOS",
      "iOS"
    ],
    "product": "VMware vCenter Server (vCenter Server)",
    "vendor": "VMware",
    "versions": [
      {
        "lessThan": "8.0 U1b",
        "status": "affected",
        "version": "8.0",
        "versionType": "8.0 u1b"
      },
      {
        "lessThan": "7.0 u3m",
        "status": "affected",
        "version": "7.0",
        "versionType": "7.0 u3m"
      }
    ]
  },
  {
    "defaultStatus": "unaffected",
    "platforms": [
      "Windows",
      "Linux",
      "Android",
      "64 bit",
      "32 bit",
      "ARM",
      "x86",
      "MacOS",
      "iOS"
    ],
    "product": "VMware Cloud Foundation (vCenter Server)",
    "vendor": "VMware",
    "versions": [
      {
        "lessThan": "7.0 U3m, 8.0 U1b",
        "status": "affected",
        "version": "5.x",
        "versionType": "7.0 U3m, 8.0 U1b"
      },
      {
        "lessThan": "7.0 U3m, 8.0 U1b",
        "status": "affected",
        "version": "4.x",
        "versionType": "7.0 U3m, 8.0 U1b"
      }
    ]
  }
]

CVSS3

8.1

Attack Vector

NETWORK

Attack Complexity

HIGH

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

9.8

Confidence

High

EPSS

0.002

Percentile

53.9%

Related for CVELIST:CVE-2023-20895