Lucene search

K
cve[email protected]CVE-2020-4004
HistoryNov 20, 2020 - 8:15 p.m.

CVE-2020-4004

2020-11-2020:15:13
CWE-416
web.nvd.nist.gov
137
cve-2020-4004
vmware
esxi
workstation
fusion
use-after-free
xhci usb controller
vulnerability
nvd

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

4.6 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

12.6%

VMware ESXi (7.0 before ESXi70U1b-17168206, 6.7 before ESXi670-202011101-SG, 6.5 before ESXi650-202011301-SG), Workstation (15.x before 15.5.7), Fusion (11.x before 11.5.7) contain a use-after-free vulnerability in the XHCI USB controller. A malicious actor with local administrative privileges on a virtual machine may exploit this issue to execute code as the virtual machine’s VMX process running on the host.

Affected configurations

NVD
Node
applemac_os_xMatch-
AND
vmwarefusionRange11.011.5.7
Node
vmwarecloud_foundationRange3.03.10.1.2
OR
vmwareworkstationRange15.0.015.5.7
OR
vmwarecloud_foundationRange4.04.1.0.1
Node
vmwareesxiMatch6.5-
OR
vmwareesxiMatch6.5650-201701001
OR
vmwareesxiMatch6.5650-201703001
OR
vmwareesxiMatch6.5650-201703002
OR
vmwareesxiMatch6.5650-201704001
OR
vmwareesxiMatch6.5650-201707101
OR
vmwareesxiMatch6.5650-201707102
OR
vmwareesxiMatch6.5650-201707103
OR
vmwareesxiMatch6.5650-201707201
OR
vmwareesxiMatch6.5650-201707202
OR
vmwareesxiMatch6.5650-201707203
OR
vmwareesxiMatch6.5650-201707204
OR
vmwareesxiMatch6.5650-201707205
OR
vmwareesxiMatch6.5650-201707206
OR
vmwareesxiMatch6.5650-201707207
OR
vmwareesxiMatch6.5650-201707208
OR
vmwareesxiMatch6.5650-201707209
OR
vmwareesxiMatch6.5650-201707210
OR
vmwareesxiMatch6.5650-201707211
OR
vmwareesxiMatch6.5650-201707212
OR
vmwareesxiMatch6.5650-201707213
OR
vmwareesxiMatch6.5650-201707214
OR
vmwareesxiMatch6.5650-201707215
OR
vmwareesxiMatch6.5650-201707216
OR
vmwareesxiMatch6.5650-201707217
OR
vmwareesxiMatch6.5650-201707218
OR
vmwareesxiMatch6.5650-201707219
OR
vmwareesxiMatch6.5650-201707220
OR
vmwareesxiMatch6.5650-201707221
OR
vmwareesxiMatch6.5650-201710001
OR
vmwareesxiMatch6.5650-201712001
OR
vmwareesxiMatch6.5650-201803001
OR
vmwareesxiMatch6.5650-201806001
OR
vmwareesxiMatch6.5650-201808001
OR
vmwareesxiMatch6.5650-201810001
OR
vmwareesxiMatch6.5650-201810002
OR
vmwareesxiMatch6.5650-201811001
OR
vmwareesxiMatch6.5650-201811002
OR
vmwareesxiMatch6.5650-201811301
OR
vmwareesxiMatch6.5650-201901001
OR
vmwareesxiMatch6.5650-201903001
OR
vmwareesxiMatch6.5650-201905001
OR
vmwareesxiMatch6.5650-201908001
OR
vmwareesxiMatch6.5650-201910001
OR
vmwareesxiMatch6.5650-20191004001
OR
vmwareesxiMatch6.5650-201911001
OR
vmwareesxiMatch6.5650-201911401
OR
vmwareesxiMatch6.5650-201911402
OR
vmwareesxiMatch6.5650-201912001
OR
vmwareesxiMatch6.5650-201912002
OR
vmwareesxiMatch6.5650-201912101
OR
vmwareesxiMatch6.5650-201912102
OR
vmwareesxiMatch6.5650-201912103
OR
vmwareesxiMatch6.5650-201912104
OR
vmwareesxiMatch6.5650-201912301
OR
vmwareesxiMatch6.5650-201912401
OR
vmwareesxiMatch6.5650-201912402
OR
vmwareesxiMatch6.5650-201912403
OR
vmwareesxiMatch6.5650-201912404
OR
vmwareesxiMatch6.5650-202005001
OR
vmwareesxiMatch6.5650-202006001
OR
vmwareesxiMatch6.5650-202007001
OR
vmwareesxiMatch6.5650-202010001
OR
vmwareesxiMatch6.5650-202011001
OR
vmwareesxiMatch6.5650-202011002
Node
vmwareesxiMatch6.7-
OR
vmwareesxiMatch6.7670-201806001
OR
vmwareesxiMatch6.7670-201807001
OR
vmwareesxiMatch6.7670-201808001
OR
vmwareesxiMatch6.7670-201810001
OR
vmwareesxiMatch6.7670-201810101
OR
vmwareesxiMatch6.7670-201810102
OR
vmwareesxiMatch6.7670-201810103
OR
vmwareesxiMatch6.7670-201810201
OR
vmwareesxiMatch6.7670-201810202
OR
vmwareesxiMatch6.7670-201810203
OR
vmwareesxiMatch6.7670-201810204
OR
vmwareesxiMatch6.7670-201810205
OR
vmwareesxiMatch6.7670-201810206
OR
vmwareesxiMatch6.7670-201810207
OR
vmwareesxiMatch6.7670-201810208
OR
vmwareesxiMatch6.7670-201810209
OR
vmwareesxiMatch6.7670-201810210
OR
vmwareesxiMatch6.7670-201810211
OR
vmwareesxiMatch6.7670-201810212
OR
vmwareesxiMatch6.7670-201810213
OR
vmwareesxiMatch6.7670-201810214
OR
vmwareesxiMatch6.7670-201810215
OR
vmwareesxiMatch6.7670-201810216
OR
vmwareesxiMatch6.7670-201810217
OR
vmwareesxiMatch6.7670-201810218
OR
vmwareesxiMatch6.7670-201810219
OR
vmwareesxiMatch6.7670-201810220
OR
vmwareesxiMatch6.7670-201810221
OR
vmwareesxiMatch6.7670-201810222
OR
vmwareesxiMatch6.7670-201810223
OR
vmwareesxiMatch6.7670-201810224
OR
vmwareesxiMatch6.7670-201810225
OR
vmwareesxiMatch6.7670-201810226
OR
vmwareesxiMatch6.7670-201810227
OR
vmwareesxiMatch6.7670-201810228
OR
vmwareesxiMatch6.7670-201810229
OR
vmwareesxiMatch6.7670-201810230
OR
vmwareesxiMatch6.7670-201810231
OR
vmwareesxiMatch6.7670-201810232
OR
vmwareesxiMatch6.7670-201810233
OR
vmwareesxiMatch6.7670-201810234
OR
vmwareesxiMatch6.7670-201811001
OR
vmwareesxiMatch6.7670-201901001
OR
vmwareesxiMatch6.7670-201901401
OR
vmwareesxiMatch6.7670-201901402
OR
vmwareesxiMatch6.7670-201901403
OR
vmwareesxiMatch6.7670-201903001
OR
vmwareesxiMatch6.7670-201904001
OR
vmwareesxiMatch6.7670-201904201
OR
vmwareesxiMatch6.7670-201904201-ug
OR
vmwareesxiMatch6.7670-201904202
OR
vmwareesxiMatch6.7670-201904202-ug
OR
vmwareesxiMatch6.7670-201904203
OR
vmwareesxiMatch6.7670-201904203-ug
OR
vmwareesxiMatch6.7670-201904204
OR
vmwareesxiMatch6.7670-201904204-ug
OR
vmwareesxiMatch6.7670-201904205
OR
vmwareesxiMatch6.7670-201904205-ug
OR
vmwareesxiMatch6.7670-201904206
OR
vmwareesxiMatch6.7670-201904206-ug
OR
vmwareesxiMatch6.7670-201904207
OR
vmwareesxiMatch6.7670-201904207-ug
OR
vmwareesxiMatch6.7670-201904208
OR
vmwareesxiMatch6.7670-201904208-ug
OR
vmwareesxiMatch6.7670-201904209
OR
vmwareesxiMatch6.7670-201904209-ug
OR
vmwareesxiMatch6.7670-201904210
OR
vmwareesxiMatch6.7670-201904210-ug
OR
vmwareesxiMatch6.7670-201904211
OR
vmwareesxiMatch6.7670-201904211-ug
OR
vmwareesxiMatch6.7670-201904212
OR
vmwareesxiMatch6.7670-201904212-ug
OR
vmwareesxiMatch6.7670-201904213
OR
vmwareesxiMatch6.7670-201904213-ug
OR
vmwareesxiMatch6.7670-201904214
OR
vmwareesxiMatch6.7670-201904214-ug
OR
vmwareesxiMatch6.7670-201904215
OR
vmwareesxiMatch6.7670-201904215-ug
OR
vmwareesxiMatch6.7670-201904216
OR
vmwareesxiMatch6.7670-201904216-ug
OR
vmwareesxiMatch6.7670-201904217
OR
vmwareesxiMatch6.7670-201904217-ug
OR
vmwareesxiMatch6.7670-201904218
OR
vmwareesxiMatch6.7670-201904218-ug
OR
vmwareesxiMatch6.7670-201904219
OR
vmwareesxiMatch6.7670-201904219-ug
OR
vmwareesxiMatch6.7670-201904220
OR
vmwareesxiMatch6.7670-201904220-ug
OR
vmwareesxiMatch6.7670-201904221
OR
vmwareesxiMatch6.7670-201904221-ug
OR
vmwareesxiMatch6.7670-201904222
OR
vmwareesxiMatch6.7670-201904222-ug
OR
vmwareesxiMatch6.7670-201904223
OR
vmwareesxiMatch6.7670-201904223-ug
OR
vmwareesxiMatch6.7670-201904224
OR
vmwareesxiMatch6.7670-201904224-ug
OR
vmwareesxiMatch6.7670-201904225
OR
vmwareesxiMatch6.7670-201904225-ug
OR
vmwareesxiMatch6.7670-201904226
OR
vmwareesxiMatch6.7670-201905001
OR
vmwareesxiMatch6.7670-201906002
OR
vmwareesxiMatch6.7670-201911001
OR
vmwareesxiMatch6.7670-201912001
OR
vmwareesxiMatch6.7670-202004001
OR
vmwareesxiMatch6.7670-202004002
OR
vmwareesxiMatch6.7670-202006001
OR
vmwareesxiMatch6.7670-202008001
OR
vmwareesxiMatch6.7670-202010001
Node
vmwareesxiMatch7.0-
OR
vmwareesxiMatch7.0beta
OR
vmwareesxiMatch7.0update_1
OR
vmwareesxiMatch7.0update_1a
OR
vmwareesxiMatch7.0update_1b
CPENameOperatorVersion
vmware:fusionvmware fusionlt11.5.7

CNA Affected

[
  {
    "product": "VMware ESXi",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "7.0 before ESXi70U1b-17168206"
      },
      {
        "status": "affected",
        "version": "6.7 before ESXi670-202011101-SG"
      },
      {
        "status": "affected",
        "version": "6.5 before ESXi650-202011301-SG"
      }
    ]
  },
  {
    "product": "Workstation",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "15.x before 15.5.7"
      }
    ]
  },
  {
    "product": "Fusion",
    "vendor": "n/a",
    "versions": [
      {
        "status": "affected",
        "version": "11.x before 11.5.7"
      }
    ]
  }
]

8.2 High

CVSS3

Attack Vector

LOCAL

Attack Complexity

LOW

Privileges Required

HIGH

User Interaction

NONE

Scope

CHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:L/AC:L/PR:H/UI:N/S:C/C:H/I:H/A:H

7.8 High

AI Score

Confidence

High

4.6 Medium

CVSS2

Access Vector

Access Complexity

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:L/AC:L/Au:N/C:P/I:P/A:P

0.0004 Low

EPSS

Percentile

12.6%