Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2020-3992 (GCVE-0-2020-3992)
Vulnerability from cvelistv5 – Published: 2020-10-20 16:11 – Updated: 2025-10-21 23:35- Remote code execution vulnerability
| URL | Tags | ||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
| Vendor | Product | Version | ||
|---|---|---|---|---|
| n/a | VMware ESXi |
Affected:
VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG)
|
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-04T07:52:20.539Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
},
{
"tags": [
"x_refsource_MISC",
"x_transferred"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"cvssV3_1": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
}
},
{
"other": {
"content": {
"id": "CVE-2020-3992",
"options": [
{
"Exploitation": "active"
},
{
"Automatable": "yes"
},
{
"Technical Impact": "total"
}
],
"role": "CISA Coordinator",
"timestamp": "2025-01-29T17:59:04.045831Z",
"version": "2.0.3"
},
"type": "ssvc"
}
},
{
"other": {
"content": {
"dateAdded": "2021-11-03",
"reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992"
},
"type": "kev"
}
}
],
"problemTypes": [
{
"descriptions": [
{
"cweId": "CWE-416",
"description": "CWE-416 Use After Free",
"lang": "en",
"type": "CWE"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2025-10-21T23:35:35.278Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"references": [
{
"tags": [
"government-resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992"
}
],
"timeline": [
{
"lang": "en",
"time": "2021-11-03T00:00:00.000Z",
"value": "CVE-2020-3992 added to CISA KEV"
}
],
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "VMware ESXi",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG)"
}
]
}
],
"descriptions": [
{
"lang": "en",
"value": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Remote code execution vulnerability",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2020-11-25T23:06:15.000Z",
"orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"shortName": "vmware"
},
"references": [
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
},
{
"tags": [
"x_refsource_MISC"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "security@vmware.com",
"ID": "CVE-2020-3992",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "VMware ESXi",
"version": {
"version_data": [
{
"version_value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html",
"refsource": "MISC",
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
"assignerShortName": "vmware",
"cveId": "CVE-2020-3992",
"datePublished": "2020-10-20T16:11:13.000Z",
"dateReserved": "2019-12-30T00:00:00.000Z",
"dateUpdated": "2025-10-21T23:35:35.278Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"cisa_known_exploited": {
"cveID": "CVE-2020-3992",
"cwes": "[\"CWE-416\"]",
"dateAdded": "2021-11-03",
"dueDate": "2022-05-03",
"knownRansomwareCampaignUse": "Known",
"notes": "https://nvd.nist.gov/vuln/detail/CVE-2020-3992",
"product": "ESXi",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "VMware ESXi OpenSLP contains a use-after-free vulnerability that allows an attacker residing in the management network with access to port 427 to perform remote code execution.",
"vendorProject": "VMware",
"vulnerabilityName": "VMware ESXi OpenSLP Use-After-Free Vulnerability"
},
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2020-0023.html\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1377/\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1385/\", \"tags\": [\"x_refsource_MISC\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-04T07:52:20.539Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}}, {\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2020-3992\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"yes\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2025-01-29T17:59:04.045831Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2021-11-03\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992\"}}}], \"timeline\": [{\"lang\": \"en\", \"time\": \"2021-11-03T00:00:00.000Z\", \"value\": \"CVE-2020-3992 added to CISA KEV\"}], \"references\": [{\"url\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992\", \"tags\": [\"government-resource\"]}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-416\", \"description\": \"CWE-416 Use After Free\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2025-01-29T17:58:45.740Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"n/a\", \"product\": \"VMware ESXi\", \"versions\": [{\"status\": \"affected\", \"version\": \"VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG)\"}]}], \"references\": [{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2020-0023.html\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1377/\", \"tags\": [\"x_refsource_MISC\"]}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1385/\", \"tags\": [\"x_refsource_MISC\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Remote code execution vulnerability\"}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2020-11-25T23:06:15.000Z\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG)\"}]}, \"product_name\": \"VMware ESXi\"}]}, \"vendor_name\": \"n/a\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2020-0023.html\", \"name\": \"https://www.vmware.com/security/advisories/VMSA-2020-0023.html\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1377/\", \"name\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1377/\", \"refsource\": \"MISC\"}, {\"url\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1385/\", \"name\": \"https://www.zerodayinitiative.com/advisories/ZDI-20-1385/\", \"refsource\": \"MISC\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Remote code execution vulnerability\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2020-3992\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"security@vmware.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2020-3992\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2025-10-21T23:35:35.278Z\", \"dateReserved\": \"2019-12-30T00:00:00.000Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2020-10-20T16:11:13.000Z\", \"assignerShortName\": \"vmware\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
CERTFR-2020-AVI-658
Vulnerability from certfr_avis - Published: 2020-10-20 - Updated: 2020-10-20
De multiples vulnérabilités ont été découvertes dans les produits VMware. Elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service, une atteinte à l'intégrité et à la confidentialité des données.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| VMware | N/A | vCenter 6.7.x versions antérieures à 6.7 U3 | ||
| VMware | ESXi | ESXi 7.0.x versions antérieures à ESXi_7.0.1-0.0.16850804 | ||
| VMware | N/A | vCenter 6.5.x versions antérieures à 6.5 U3K | ||
| VMware | Fusion | Fusion 11.x versions antérieures à 11.5.6 | ||
| VMware | NSX | NSX-T 3.x versions antérieures à 3.0.2 | ||
| VMware | Cloud Foundation | VMware Cloud Foundation 3.x versions antérieures à 3.10.1.1 | ||
| VMware | ESXi | ESXi 6.7.x versions antérieures à ESXi670-202010401-SG | ||
| VMware | NSX | NSX-T 2.5.x versions antérieures à 2.5.2.2.0 | ||
| VMware | Cloud Foundation | VMware Cloud Foundation 4.x versions antérieures à 4.1 | ||
| VMware | ESXi | ESXi 6.5.x versions antérieures à ESXi650-202010401-SG | ||
| VMware | N/A | Workstation 15.x toutes versions |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "vCenter 6.7.x versions ant\u00e9rieures \u00e0 6.7 U3",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi 7.0.x versions ant\u00e9rieures \u00e0 ESXi_7.0.1-0.0.16850804",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "vCenter 6.5.x versions ant\u00e9rieures \u00e0 6.5 U3K",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Fusion 11.x versions ant\u00e9rieures \u00e0 11.5.6",
"product": {
"name": "Fusion",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NSX-T 3.x versions ant\u00e9rieures \u00e0 3.0.2",
"product": {
"name": "NSX",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Cloud Foundation 3.x versions ant\u00e9rieures \u00e0 3.10.1.1",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi 6.7.x versions ant\u00e9rieures \u00e0 ESXi670-202010401-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "NSX-T 2.5.x versions ant\u00e9rieures \u00e0 2.5.2.2.0",
"product": {
"name": "NSX",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "VMware Cloud Foundation 4.x versions ant\u00e9rieures \u00e0 4.1",
"product": {
"name": "Cloud Foundation",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "ESXi 6.5.x versions ant\u00e9rieures \u00e0 ESXi650-202010401-SG",
"product": {
"name": "ESXi",
"vendor": {
"name": "VMware",
"scada": false
}
}
},
{
"description": "Workstation 15.x toutes versions",
"product": {
"name": "N/A",
"vendor": {
"name": "VMware",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2020-3981",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3981"
},
{
"name": "CVE-2020-3994",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3994"
},
{
"name": "CVE-2020-3993",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3993"
},
{
"name": "CVE-2020-3995",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3995"
},
{
"name": "CVE-2020-3982",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3982"
},
{
"name": "CVE-2020-3992",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3992"
}
],
"initial_release_date": "2020-10-20T00:00:00",
"last_revision_date": "2020-10-20T00:00:00",
"links": [],
"reference": "CERTFR-2020-AVI-658",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2020-10-20T00:00:00.000000"
}
],
"risks": [
{
"description": "Atteinte \u00e0 l\u0027int\u00e9grit\u00e9 des donn\u00e9es"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "D\u00e9ni de service"
},
{
"description": "Atteinte \u00e0 la confidentialit\u00e9 des donn\u00e9es"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans les produits\nVMware. Elles permettent \u00e0 un attaquant de provoquer une ex\u00e9cution de\ncode arbitraire, un d\u00e9ni de service, une atteinte \u00e0 l\u0027int\u00e9grit\u00e9 et \u00e0 la\nconfidentialit\u00e9 des donn\u00e9es.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits VMware",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0023 du 20 octobre 2020",
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
}
]
}
GSD-2020-3992
Vulnerability from gsd - Updated: 2023-12-13 01:22{
"GSD": {
"alias": "CVE-2020-3992",
"description": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.",
"id": "GSD-2020-3992"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2020-3992"
],
"details": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.",
"id": "GSD-2020-3992",
"modified": "2023-12-13T01:22:09.990267Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cisa.gov": {
"cveID": "CVE-2020-3992",
"dateAdded": "2021-11-03",
"dueDate": "2022-05-03",
"product": "ESXi",
"requiredAction": "Apply updates per vendor instructions.",
"shortDescription": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.",
"vendorProject": "VMware",
"vulnerabilityName": "OpenSLP as used in VMware ESXi"
},
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "security@vmware.com",
"ID": "CVE-2020-3992",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "VMware ESXi",
"version": {
"version_data": [
{
"version_value": "VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG)"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Remote code execution vulnerability"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html",
"refsource": "MISC",
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/",
"refsource": "MISC",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "4.1",
"versionStartIncluding": "4.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"cpe_name": [],
"versionEndExcluding": "3.10.1.1",
"versionStartIncluding": "3.0",
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.5:650-202010001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:o:vmware:esxi:7.0.0:1.20.16321839:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "security@vmware.com",
"ID": "CVE-2020-3992"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html",
"refsource": "MISC",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
},
{
"name": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/",
"refsource": "MISC",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
}
]
}
},
"impact": {
"baseMetricV2": {
"acInsufInfo": false,
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
},
"baseMetricV3": {
"cvssV3": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9
}
},
"lastModifiedDate": "2022-06-15T02:59Z",
"publishedDate": "2020-10-20T17:15Z"
}
}
}
CVE-2020-3992
Vulnerability from fstec - Published: 15.10.2020{
"CVSS 2.0": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"CVSS 3.0": "AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"CVSS 4.0": null,
"remediation_\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": null,
"remediation_\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435": null,
"\u0412\u0435\u043d\u0434\u043e\u0440 \u041f\u041e": "VMware Inc.",
"\u0412\u0435\u0440\u0441\u0438\u044f \u041f\u041e": "\u0434\u043e 4.1 (VMware Cloud Foundation), \u0434\u043e ESXi_7.0.1-0.0.16850804 (VMware ESXi), \u0434\u043e ESXi670-202010401-SG (VMware ESXi), \u0434\u043e ESXi650-202010401-SG (VMware ESXi), \u0434\u043e 3.10.1.1 (VMware Cloud Foundation)",
"\u0412\u043e\u0437\u043c\u043e\u0436\u043d\u044b\u0435 \u043c\u0435\u0440\u044b \u043f\u043e \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044e": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u0440\u0435\u043a\u043e\u043c\u0435\u043d\u0434\u0430\u0446\u0438\u0439:\nhttps://www.vmware.com/security/advisories/VMSA-2020-0023.html",
"\u0414\u0430\u0442\u0430 \u0432\u044b\u044f\u0432\u043b\u0435\u043d\u0438\u044f": "15.10.2020",
"\u0414\u0430\u0442\u0430 \u043f\u043e\u0441\u043b\u0435\u0434\u043d\u0435\u0433\u043e \u043e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u044f": "24.09.2024",
"\u0414\u0430\u0442\u0430 \u043f\u0443\u0431\u043b\u0438\u043a\u0430\u0446\u0438\u0438": "29.10.2020",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440": "BDU:2020-04911",
"\u0418\u0434\u0435\u043d\u0442\u0438\u0444\u0438\u043a\u0430\u0442\u043e\u0440\u044b \u0434\u0440\u0443\u0433\u0438\u0445 \u0441\u0438\u0441\u0442\u0435\u043c \u043e\u043f\u0438\u0441\u0430\u043d\u0438\u0439 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "CVE-2020-3992",
"\u0418\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f \u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0430",
"\u041a\u043b\u0430\u0441\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043a\u043e\u0434\u0430",
"\u041d\u0430\u0437\u0432\u0430\u043d\u0438\u0435 \u041f\u041e": "VMware Cloud Foundation, VMware ESXi",
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u041e\u0421 \u0438 \u0442\u0438\u043f \u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0439 \u043f\u043b\u0430\u0442\u0444\u043e\u0440\u043c\u044b": null,
"\u041d\u0430\u0438\u043c\u0435\u043d\u043e\u0432\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 openslp \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u043e\u0432 VMware ESXi, VMware Workstation \u0438 VMware Fusion, \u043f\u043e\u0437\u0432\u043e\u043b\u044f\u044e\u0449\u0430\u044f \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041d\u0430\u043b\u0438\u0447\u0438\u0435 \u044d\u043a\u0441\u043f\u043b\u043e\u0439\u0442\u0430": "\u0421\u0443\u0449\u0435\u0441\u0442\u0432\u0443\u0435\u0442",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "\u0418\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f (CWE-416)",
"\u041e\u043f\u0438\u0441\u0430\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u0423\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u044c \u043f\u0430\u043a\u0435\u0442\u0430 openslp \u0433\u0438\u043f\u0435\u0440\u0432\u0438\u0437\u043e\u0440\u043e\u0432 VMware ESXi, VMware Workstation \u0438 VMware Fusion \u0441\u0432\u044f\u0437\u0430\u043d\u0430 \u0441 \u0438\u0441\u043f\u043e\u043b\u044c\u0437\u043e\u0432\u0430\u043d\u0438\u0435\u043c \u043f\u0430\u043c\u044f\u0442\u0438 \u043f\u043e\u0441\u043b\u0435 \u043e\u0441\u0432\u043e\u0431\u043e\u0436\u0434\u0435\u043d\u0438\u044f. \u042d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u044f \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438 \u043c\u043e\u0436\u0435\u0442 \u043f\u043e\u0437\u0432\u043e\u043b\u0438\u0442\u044c \u043d\u0430\u0440\u0443\u0448\u0438\u0442\u0435\u043b\u044e \u0432\u044b\u043f\u043e\u043b\u043d\u0438\u0442\u044c \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u043b\u044c\u043d\u044b\u0439 \u043a\u043e\u0434, \u0432\u044b\u0437\u0432\u0430\u0442\u044c \u043e\u0442\u043a\u0430\u0437 \u0432 \u043e\u0431\u0441\u043b\u0443\u0436\u0438\u0432\u0430\u043d\u0438\u0438 \u0438\u043b\u0438 \u043f\u043e\u043b\u0443\u0447\u0438\u0442\u044c \u043d\u0435\u0441\u0430\u043d\u043a\u0446\u0438\u043e\u043d\u0438\u0440\u043e\u0432\u0430\u043d\u043d\u044b\u0439 \u0434\u043e\u0441\u0442\u0443\u043f \u043a \u0437\u0430\u0449\u0438\u0449\u0430\u0435\u043c\u043e\u0439 \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u0438",
"\u041f\u043e\u0441\u043b\u0435\u0434\u0441\u0442\u0432\u0438\u044f \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": null,
"\u041f\u0440\u043e\u0447\u0430\u044f \u0438\u043d\u0444\u043e\u0440\u043c\u0430\u0446\u0438\u044f": null,
"\u0421\u0432\u044f\u0437\u044c \u0441 \u0438\u043d\u0446\u0438\u0434\u0435\u043d\u0442\u0430\u043c\u0438 \u0418\u0411": "\u0414\u0430",
"\u0421\u043e\u0441\u0442\u043e\u044f\u043d\u0438\u0435 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041e\u043f\u0443\u0431\u043b\u0438\u043a\u043e\u0432\u0430\u043d\u0430",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u0443\u0441\u0442\u0440\u0430\u043d\u0435\u043d\u0438\u044f": "\u041e\u0431\u043d\u043e\u0432\u043b\u0435\u043d\u0438\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0433\u043e \u043e\u0431\u0435\u0441\u043f\u0435\u0447\u0435\u043d\u0438\u044f",
"\u0421\u043f\u043e\u0441\u043e\u0431 \u044d\u043a\u0441\u043f\u043b\u0443\u0430\u0442\u0430\u0446\u0438\u0438": "\u041c\u0430\u043d\u0438\u043f\u0443\u043b\u0438\u0440\u043e\u0432\u0430\u043d\u0438\u0435 \u0441\u0442\u0440\u0443\u043a\u0442\u0443\u0440\u0430\u043c\u0438 \u0434\u0430\u043d\u043d\u044b\u0445",
"\u0421\u0441\u044b\u043b\u043a\u0438 \u043d\u0430 \u0438\u0441\u0442\u043e\u0447\u043d\u0438\u043a\u0438": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html\nhttps://www.cisa.gov/sites/default/files/csv/known_exploited_vulnerabilities.csv",
"\u0421\u0442\u0430\u0442\u0443\u0441 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041f\u043e\u0434\u0442\u0432\u0435\u0440\u0436\u0434\u0435\u043d\u0430 \u043f\u0440\u043e\u0438\u0437\u0432\u043e\u0434\u0438\u0442\u0435\u043b\u0435\u043c",
"\u0422\u0438\u043f \u041f\u041e": "\u0421\u0435\u0442\u0435\u0432\u043e\u0435 \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e\u0435 \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u043e, \u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u0438\u0437\u0430\u0446\u0438\u0438/\u041f\u041e \u0432\u0438\u0440\u0442\u0443\u0430\u043b\u044c\u043d\u043e\u0433\u043e \u043f\u0440\u043e\u0433\u0440\u0430\u043c\u043c\u043d\u043e-\u0430\u043f\u043f\u0430\u0440\u0430\u0442\u043d\u043e\u0433\u043e \u0441\u0440\u0435\u0434\u0441\u0442\u0432\u0430",
"\u0422\u0438\u043f \u043e\u0448\u0438\u0431\u043a\u0438 CWE": "CWE-416",
"\u0423\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 \u0443\u044f\u0437\u0432\u0438\u043c\u043e\u0441\u0442\u0438": "\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 2.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 10)\n\u041a\u0440\u0438\u0442\u0438\u0447\u0435\u0441\u043a\u0438\u0439 \u0443\u0440\u043e\u0432\u0435\u043d\u044c \u043e\u043f\u0430\u0441\u043d\u043e\u0441\u0442\u0438 (\u0431\u0430\u0437\u043e\u0432\u0430\u044f \u043e\u0446\u0435\u043d\u043a\u0430 CVSS 3.0 \u0441\u043e\u0441\u0442\u0430\u0432\u043b\u044f\u0435\u0442 9,8)"
}
GHSA-58FF-49FR-3JWF
Vulnerability from github – Published: 2022-05-24 17:31 – Updated: 2025-10-22 00:31OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.
{
"affected": [],
"aliases": [
"CVE-2020-3992"
],
"database_specific": {
"cwe_ids": [
"CWE-416"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2020-10-20T17:15:00Z",
"severity": "CRITICAL"
},
"details": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution.",
"id": "GHSA-58ff-49fr-3jwf",
"modified": "2025-10-22T00:31:59Z",
"published": "2022-05-24T17:31:50Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2020-3992"
},
{
"type": "WEB",
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992"
},
{
"type": "WEB",
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377"
},
{
"type": "WEB",
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385"
}
],
"schema_version": "1.4.0",
"severity": [
{
"score": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"type": "CVSS_V3"
}
]
}
CERTFR-2023-ALE-015
Vulnerability from certfr_alerte - Published: 2023-02-03 - Updated: 2023-03-14
[Mise à jour du 10 février
2023]
Une nouvelle vague d’attaque démarrée le 8 février change la méthode de
chiffrement permettant de chiffrer un plus grand volume de données dans
les fichiers de grande taille rendant la restauration des données plus
difficile voire impossible.
[Mise à jour du 05 février 2023] Mise à jour du résumé et de la section 'Solution'.
Le 03 février 2023, le CERT-FR a pris connaissance de campagnes d'attaque ciblant les hyperviseurs VMware ESXi dans le but d'y déployer un rançongiciel.
Dans l'état actuel des investigations, ces campagnes d'attaque semblent avoir tiré parti de l'exposition d'hyperviseurs ESXi qui n'auraient pas été mis à jour des correctifs de sécurité suffisamment rapidement. En particulier, le service SLP semble avoir été visé, service pour lequel plusieurs vulnérabilités avaient fait l'objet de correctifs successifs (notamment les vulnérabilités CVE-2020-3992 et CVE-2021-21974, cf. section Documentation). Ces vulnérabilités permettent à un attaquant de réaliser une exploitation de code arbitraire à distance. Des codes d'exploitation sont disponibles en source ouverte depuis au moins mai 2021.
Les systèmes actuellement visés seraient des hyperviseurs ESXi en version 6.x et antérieures à 6.7.
Cependant, le CERT-FR rappelle que les vulnérabilités affectant SLP concernent les systèmes suivants :
- ESXi versions 7.x antérieures à ESXi70U1c-17325551
- ESXi versions 6.7.x antérieures à ESXi670-202102401-SG
- ESXi versions 6.5.x antérieures à ESXi650-202102101-SG
Solution
[Mise à jour du 05 février 2023]
Le CERT-FR a la confirmation qu'il est possible de récupérer les disques des machines virtuelles lorsque les fichiers de configuration (.vmdk) sont chiffrés et renommés avec une extension .args. En effet, dans ce cas, le fichier contenant le disque virtuel (fichier -flat.vmdk) n'est pas chiffré. Plusieurs procédures testées avec succès sont documentées [1].
Le CERT-FR recommande fortement de :
- isoler le serveur affecté ;
- dans la mesure du possible, effectuer une analyse des systèmes afin de détecter tout signe de compromission [2], l'application seule des correctifs n'est pas suffisante, un attaquant a probablement déjà déposé un code malveillant ;
- privilégier une réinstallation de l'hyperviseur dans une version supportée par l'éditeur (ESXi 7.x ou ESXi 8.x) ;
- appliquer l'ensemble des correctifs de sécurité et de suivre les futurs avis de sécurité de l'éditeur ;
- désactiver les services inutiles sur l'hyperviseur (tel que le service SLP [3]) ;
- bloquer l'accès aux différents services d'administration, soit par un pare-feu dédié, soit par le pare-feu intégré à l'hyperviseur et mettre en œuvre un réseau local d'administration ainsi qu'une capacité d'administration distante si elle est requise (via réseau privé virtuel, VPN, ou, à défaut, par un filtrage des adresses IP de confiance).
La mise à jour d'un produit ou d'un logiciel est une opération délicate qui doit être menée avec prudence. Il est notamment recommandé d'effectuer des tests autant que possible. Des dispositions doivent également être prises pour garantir la continuité de service en cas de difficultés lors de l'application des mises à jour comme des correctifs ou des changements de version.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
|
|
|||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "",
"closed_at": "2023-03-14",
"content": "## Solution\n\n\\[Mise \u00e0 jour du 05 f\u00e9vrier 2023\\]\n\nLe CERT-FR a la confirmation qu\u0027il est possible de r\u00e9cup\u00e9rer les disques\ndes machines virtuelles lorsque les fichiers de configuration (*.vmdk*)\nsont chiffr\u00e9s et renomm\u00e9s avec une extension *.args.* En effet, dans ce\ncas, le fichier contenant le disque virtuel (fichier *-flat.vmdk*) n\u0027est\npas chiffr\u00e9. Plusieurs proc\u00e9dures test\u00e9es avec succ\u00e8s sont document\u00e9es\n\\[1\\].\n\nLe CERT-FR recommande fortement de :\n\n- isoler le serveur affect\u00e9 ;\n- dans la mesure du possible, effectuer une analyse des syst\u00e8mes afin\n de d\u00e9tecter tout signe de compromission \\[2\\], l\u0027application seule\n des correctifs n\u0027est pas suffisante, un attaquant a probablement\n d\u00e9j\u00e0 d\u00e9pos\u00e9 un code malveillant ;\n- privil\u00e9gier une r\u00e9installation de l\u0027hyperviseur dans une version\n support\u00e9e par l\u0027\u00e9diteur (ESXi 7.x ou ESXi 8.x) ;\n- appliquer l\u0027ensemble des correctifs de s\u00e9curit\u00e9 et de suivre les\n futurs avis de s\u00e9curit\u00e9 de l\u0027\u00e9diteur ;\n- d\u00e9sactiver les services inutiles sur l\u0027hyperviseur (tel que le\n service *SLP* \\[3\\]) ;\n- bloquer l\u0027acc\u00e8s aux diff\u00e9rents services d\u0027administration, soit par\n un pare-feu d\u00e9di\u00e9, soit par le pare-feu int\u00e9gr\u00e9 \u00e0 l\u0027hyperviseur et\n mettre en \u0153uvre un r\u00e9seau local d\u0027administration ainsi qu\u0027une\n capacit\u00e9 d\u0027administration distante si elle est requise (*via* r\u00e9seau\n priv\u00e9 virtuel, *VPN*, ou, \u00e0 d\u00e9faut, par un filtrage des adresses IP\n de confiance).\n\n\u00a0\n\n------------------------------------------------------------------------\n\nLa mise \u00e0 jour d\u0027un produit ou d\u0027un logiciel est une op\u00e9ration d\u00e9licate\nqui doit \u00eatre men\u00e9e avec prudence. Il est notamment recommand\u00e9\nd\u0027effectuer des tests autant que possible. Des dispositions doivent\n\u00e9galement \u00eatre prises pour garantir la continuit\u00e9 de service en cas de\ndifficult\u00e9s lors de l\u0027application des mises \u00e0 jour comme des correctifs\nou des changements de version.\n",
"cves": [
{
"name": "CVE-2021-21974",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-21974"
},
{
"name": "CVE-2020-3992",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-3992"
}
],
"initial_release_date": "2023-02-03T00:00:00",
"last_revision_date": "2023-03-14T00:00:00",
"links": [
{
"title": "[3] Proc\u00e9dure permettant de d\u00e9sactiver le service SLP",
"url": "https://kb.vmware.com/s/article/76372"
},
{
"title": "[1] Proc\u00e9dures de r\u00e9cup\u00e9ration des machines virtuelles",
"url": "https://gist.github.com/MarianBojescu/da539a47d5eae29383a4804218ad7220"
},
{
"title": "[2] Les bons r\u00e9flexes en cas d\u2019intrusion sur un syst\u00e8me d\u2019information",
"url": "https://www.cert.ssi.gouv.fr/les-bons-reflexes-en-cas-dintrusion-sur-un-systeme-dinformation/"
},
{
"title": "Avis de s\u00e9curit\u00e9 CERT-FR CERTFR-2021-AVI-145 du 24 f\u00e9vrier 2021",
"url": "https://www.cert.ssi.gouv.fr/avis/CERTFR-2021-AVI-145/"
},
{
"title": "[1] Proc\u00e9dures de r\u00e9cup\u00e9ration des machines virtuelles",
"url": "https://enes.dev"
}
],
"reference": "CERTFR-2023-ALE-015",
"revisions": [
{
"description": "Version initiale.",
"revision_date": "2023-02-03T00:00:00.000000"
},
{
"description": "Clarification de la section \u0027Solution\u0027",
"revision_date": "2023-02-03T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour de la section \u0027R\u00e9sum\u00e9\u0027 et de la section \u0027Solution\u0027",
"revision_date": "2023-02-05T00:00:00.000000"
},
{
"description": "Mise \u00e0 jour de la section \u0027Solution\u0027",
"revision_date": "2023-02-10T00:00:00.000000"
},
{
"description": "Cl\u00f4ture de l\u0027alerte. Cela ne signifie pas la fin d\u0027une menace. Seule l\u0027application de la mise \u00e0 jour permet de vous pr\u00e9munir contre l\u0027exploitation de la vuln\u00e9rabilit\u00e9 correspondante.",
"revision_date": "2023-03-14T00:00:00.000000"
}
],
"risks": [
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "\u003cspan style=\"color: #ff0000;\"\u003e\\[Mise \u00e0 jour du 10 f\u00e9vrier\n2023\\]\u003c/span\u003e \nUne nouvelle vague d\u2019attaque d\u00e9marr\u00e9e le 8 f\u00e9vrier change la m\u00e9thode de\nchiffrement permettant de chiffrer un plus grand volume de donn\u00e9es dans\nles fichiers de grande taille rendant la restauration des donn\u00e9es plus\ndifficile voire impossible.\n\n\\[Mise \u00e0 jour du 05 f\u00e9vrier 2023\\] Mise \u00e0 jour du r\u00e9sum\u00e9 et de la\nsection \u0027Solution\u0027.\n\nLe 03 f\u00e9vrier 2023, le CERT-FR a pris connaissance de campagnes\nd\u0027attaque ciblant les hyperviseurs VMware ESXi dans le but d\u0027y d\u00e9ployer\nun ran\u00e7ongiciel.\n\n\u003cspan style=\"text-decoration: underline;\"\u003eDans l\u0027\u00e9tat actuel des\ninvestigations\u003c/span\u003e, ces campagnes d\u0027attaque semblent avoir tir\u00e9 parti\nde l\u0027exposition d\u0027hyperviseurs ESXi qui n\u0027auraient pas \u00e9t\u00e9 mis \u00e0 jour\ndes correctifs de s\u00e9curit\u00e9 suffisamment rapidement. En particulier, le\nservice *SLP* semble avoir \u00e9t\u00e9 vis\u00e9, service pour lequel plusieurs\nvuln\u00e9rabilit\u00e9s avaient fait l\u0027objet de correctifs successifs (notamment\nles vuln\u00e9rabilit\u00e9s CVE-2020-3992 et CVE-2021-21974, cf. section\nDocumentation). Ces vuln\u00e9rabilit\u00e9s permettent \u00e0 un attaquant de r\u00e9aliser\nune exploitation de code arbitraire \u00e0 distance. Des codes d\u0027exploitation\nsont disponibles en source ouverte depuis au moins mai 2021.\n\nLes syst\u00e8mes actuellement vis\u00e9s seraient des hyperviseurs ESXi en\nversion 6.x et ant\u00e9rieures \u00e0 6.7.\n\nCependant, le CERT-FR rappelle que les vuln\u00e9rabilit\u00e9s affectant *SLP*\nconcernent les syst\u00e8mes suivants :\n\n- ESXi versions 7.x ant\u00e9rieures \u00e0\u00a0ESXi70U1c-17325551\n- ESXi\u00a0versions 6.7.x ant\u00e9rieures \u00e0\u00a0ESXi670-202102401-SG\n- ESXi\u00a0versions 6.5.x ant\u00e9rieures \u00e0\u00a0ESXi650-202102101-SG\n\n\u00a0\n",
"title": "[M\u00e0J] Campagne d\u0027exploitation d\u0027une vuln\u00e9rabilit\u00e9 affectant VMware ESXi",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2020-0023 du 20 octobre 2020",
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 VMware VMSA-2021-0002 du 23 f\u00e9vrier 2021",
"url": "https://www.vmware.com/security/advisories/VMSA-2021-0002.html"
}
]
}
FKIE_CVE-2020-3992
Vulnerability from fkie_nvd - Published: 2020-10-20 17:15 - Updated: 2025-10-30 20:079.8 (Critical) - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
| URL | Tags | ||
|---|---|---|---|
| security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory | |
| security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-1377/ | Third Party Advisory, VDB Entry | |
| security@vmware.com | https://www.zerodayinitiative.com/advisories/ZDI-20-1385/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0023.html | Patch, Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-1377/ | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://www.zerodayinitiative.com/advisories/ZDI-20-1385/ | Third Party Advisory, VDB Entry | |
| 134c704f-9b21-4f2e-91b3-4a467353bcc0 | https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992 | US Government Resource |
{
"cisaActionDue": "2022-05-03",
"cisaExploitAdd": "2021-11-03",
"cisaRequiredAction": "Apply updates per vendor instructions.",
"cisaVulnerabilityName": "VMware ESXi OpenSLP Use-After-Free Vulnerability",
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "1995769A-1AB9-47FA-966A-8E82D414161E",
"versionEndExcluding": "3.10.1.2",
"versionStartIncluding": "3.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:vmware:cloud_foundation:*:*:*:*:*:*:*:*",
"matchCriteriaId": "DFC97E69-D4F5-46FC-AF5E-43BD48C00044",
"versionEndExcluding": "4.1.0.1",
"versionStartIncluding": "4.0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:-:*:*:*:*:*:*",
"matchCriteriaId": "FBA15143-734D-4889-8B5A-2445A2DDDD4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:2:*:*:*:*:*:*",
"matchCriteriaId": "60405BAB-A6C6-4AD8-A5D2-EAD114FE931F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201701001:*:*:*:*:*:*",
"matchCriteriaId": "04FA10C6-2B0D-47C9-8C4E-1BA98C97DC7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703001:*:*:*:*:*:*",
"matchCriteriaId": "0D2ED442-3F6D-472A-AA98-51D05A65B2E0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201703002:*:*:*:*:*:*",
"matchCriteriaId": "2A71EC72-3389-4EC7-8104-2A78F7B8C0DC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201704001:*:*:*:*:*:*",
"matchCriteriaId": "F948E806-0F73-4145-A723-7A43BA45842B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707101:*:*:*:*:*:*",
"matchCriteriaId": "75FAFF86-C65F-4723-8A63-BACE2F797937",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707102:*:*:*:*:*:*",
"matchCriteriaId": "DBC31DE3-ACFE-422F-B253-2FE4AAFE3954",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707103:*:*:*:*:*:*",
"matchCriteriaId": "B30B3EA4-495F-4915-B6E3-5FB9277C2DE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707201:*:*:*:*:*:*",
"matchCriteriaId": "6FA9E337-B4F3-4895-BA58-962F8CDEE73E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707202:*:*:*:*:*:*",
"matchCriteriaId": "830B0BC1-A368-49AC-B6C9-B000972EF92A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707203:*:*:*:*:*:*",
"matchCriteriaId": "614394F3-3BEE-4E12-AABF-436D54A04313",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707204:*:*:*:*:*:*",
"matchCriteriaId": "350FD3CE-8B64-4FCF-82DE-BE941156F4F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707205:*:*:*:*:*:*",
"matchCriteriaId": "C9EAE177-6C7E-4C1B-ADEE-2C036F731272",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707206:*:*:*:*:*:*",
"matchCriteriaId": "DFFEEC31-8462-4DF9-A1DA-D7057C209CBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707207:*:*:*:*:*:*",
"matchCriteriaId": "0AC6BC16-0A1D-44B3-BA68-63EA05EDD54B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707208:*:*:*:*:*:*",
"matchCriteriaId": "942DAD67-9455-4D02-BD3B-BFD2DE7A7E52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707209:*:*:*:*:*:*",
"matchCriteriaId": "7ACC1A72-F6B6-430A-AB89-AB0A11587F58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707210:*:*:*:*:*:*",
"matchCriteriaId": "45111C74-BF6F-4C05-A0D3-CE325AD0C02B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707211:*:*:*:*:*:*",
"matchCriteriaId": "B1CE5849-01B1-4E36-83E8-496A3F328C9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707212:*:*:*:*:*:*",
"matchCriteriaId": "A879BA05-3A80-4EBC-AA9D-9B53695425B4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707213:*:*:*:*:*:*",
"matchCriteriaId": "3D65A0E8-A1E0-42F3-B77D-2F32979278BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707214:*:*:*:*:*:*",
"matchCriteriaId": "80C10150-39BA-4818-B48F-8645D4A0D316",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707215:*:*:*:*:*:*",
"matchCriteriaId": "9792B986-86EF-40E0-9427-A45F858717E1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707216:*:*:*:*:*:*",
"matchCriteriaId": "37EDD688-C91A-4A35-913A-82E156ADD242",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707217:*:*:*:*:*:*",
"matchCriteriaId": "5CC1AC0E-8D3F-46C0-BDA9-EB9DC9971F57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707218:*:*:*:*:*:*",
"matchCriteriaId": "47DA50DA-7CA4-4B76-8B3B-A5732509F71D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707219:*:*:*:*:*:*",
"matchCriteriaId": "76EB1A04-0645-4909-AEF9-33D6FADA4793",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707220:*:*:*:*:*:*",
"matchCriteriaId": "F1A35723-D968-42D6-89EB-86CA550516E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201707221:*:*:*:*:*:*",
"matchCriteriaId": "C3AC8A19-F98E-48F1-A1EA-EAA1C7208335",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201710001:*:*:*:*:*:*",
"matchCriteriaId": "2D6A3952-8429-4762-8701-47D7C1F05A5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201712001:*:*:*:*:*:*",
"matchCriteriaId": "5B007609-C312-469B-BACF-04D6D80DADF7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201803001:*:*:*:*:*:*",
"matchCriteriaId": "514F2ECD-FC55-42A5-BEE4-DA7641CC93A7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201806001:*:*:*:*:*:*",
"matchCriteriaId": "3594E391-19CD-4803-8285-FA11BE63AB05",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201808001:*:*:*:*:*:*",
"matchCriteriaId": "2CEC248D-502E-4A8D-8786-CD72A2E3AB1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810001:*:*:*:*:*:*",
"matchCriteriaId": "4F08529C-B14C-45FB-AEA1-77D12C88CB30",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201810002:*:*:*:*:*:*",
"matchCriteriaId": "617835F5-49DA-4B42-8C7B-C122D7363A00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811001:*:*:*:*:*:*",
"matchCriteriaId": "E7DF3ED7-FA3F-4EBC-99AC-B7AD20E85927",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811002:*:*:*:*:*:*",
"matchCriteriaId": "9ED86C29-2EA6-41DD-ACCB-1E02F9CB747E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201811301:*:*:*:*:*:*",
"matchCriteriaId": "DE1372AD-2853-4BED-BB71-6BACB28B95C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201901001:*:*:*:*:*:*",
"matchCriteriaId": "F0E684DF-9E45-459E-AB75-6B4653E5C7CF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201903001:*:*:*:*:*:*",
"matchCriteriaId": "B3DDD3E9-186F-472C-BA76-C2A363206792",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201905001:*:*:*:*:*:*",
"matchCriteriaId": "A09E9914-DB27-41EF-B55D-5B79ECD1DA69",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201908001:*:*:*:*:*:*",
"matchCriteriaId": "7F916A39-13BD-44A7-A9EC-1FD40EBE357C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201910001:*:*:*:*:*:*",
"matchCriteriaId": "4F8219B4-1FC2-4383-83E6-92DF700C72D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-20191004001:*:*:*:*:*:*",
"matchCriteriaId": "C44C9D6A-8BBE-4970-A732-B9F86D42A55D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911001:*:*:*:*:*:*",
"matchCriteriaId": "427F4ED8-8782-4BDF-A559-11CB8E0A65F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911401:*:*:*:*:*:*",
"matchCriteriaId": "63DDC95E-BBCD-4A68-9AFB-B5F9D206818E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201911402:*:*:*:*:*:*",
"matchCriteriaId": "B27E3424-5D4E-4E5D-8762-7AECBB11FE16",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912001:*:*:*:*:*:*",
"matchCriteriaId": "2D217AAB-D45F-480B-8F82-16B261F370D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912002:*:*:*:*:*:*",
"matchCriteriaId": "1B58312B-D72B-4F13-9EF5-0F42CE592757",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912101:*:*:*:*:*:*",
"matchCriteriaId": "8FBB88C2-793A-40F2-AA40-EC315115AE0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912102:*:*:*:*:*:*",
"matchCriteriaId": "21F59801-904B-427F-A1A9-C933E38AB7AB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912103:*:*:*:*:*:*",
"matchCriteriaId": "5A3FFDE9-FD36-41F9-AC35-E14BB6AEF7CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912104:*:*:*:*:*:*",
"matchCriteriaId": "D22AFAE1-F817-4037-8EE5-AF04314AAAB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912301:*:*:*:*:*:*",
"matchCriteriaId": "8D4C44D6-73AD-48A3-B5F3-31B1FDC77E40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912401:*:*:*:*:*:*",
"matchCriteriaId": "5D1694B2-1CD9-4943-8CFF-38218CDB88F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912402:*:*:*:*:*:*",
"matchCriteriaId": "154B54C8-1D65-4D3E-A64B-CF2D21E71FD2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912403:*:*:*:*:*:*",
"matchCriteriaId": "D86BCD56-4BD6-4C61-B80E-12E47D12A00F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-201912404:*:*:*:*:*:*",
"matchCriteriaId": "6741A159-1D92-4E25-BD43-606DE1138D49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202005001:*:*:*:*:*:*",
"matchCriteriaId": "DCC98C53-EEC1-4CFE-9C31-9F2592723B3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202006001:*:*:*:*:*:*",
"matchCriteriaId": "C565246C-896C-4E48-8C24-344C9B0A3057",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202007001:*:*:*:*:*:*",
"matchCriteriaId": "8479F377-4F47-433D-867D-A94A4B0E46EC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.5:650-202010001:*:*:*:*:*:*",
"matchCriteriaId": "ECC2468D-6B23-4C7E-951B-DDA8DD17B51E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:-:*:*:*:*:*:*",
"matchCriteriaId": "B2792D06-A73E-4A56-A152-82E1AD4E707D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201806001:*:*:*:*:*:*",
"matchCriteriaId": "0CE9D758-2170-4ACD-965C-C76BDA693466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201807001:*:*:*:*:*:*",
"matchCriteriaId": "FD4A373B-2AC6-4193-9C34-1E4EEB552A9C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201808001:*:*:*:*:*:*",
"matchCriteriaId": "E75F4E15-2C5F-4667-B8A4-0EE9895FAEC5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810001:*:*:*:*:*:*",
"matchCriteriaId": "8B75B45F-E25A-4362-856D-465A9F8B70DB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810101:*:*:*:*:*:*",
"matchCriteriaId": "EDA4AE4C-3BA8-472D-950A-3C8684565CD8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810102:*:*:*:*:*:*",
"matchCriteriaId": "6AA3617D-B911-4BC5-B544-B31D4F43D2B3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810103:*:*:*:*:*:*",
"matchCriteriaId": "CDC6E0F6-83DF-4670-8D04-A41C7DC1B881",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810201:*:*:*:*:*:*",
"matchCriteriaId": "047A71B3-CDFB-41F3-B2DE-11360DAE5744",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810202:*:*:*:*:*:*",
"matchCriteriaId": "F88691FD-F263-4B75-BF21-481BC1623C3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810203:*:*:*:*:*:*",
"matchCriteriaId": "D2A47CDA-D3DD-4E0F-8268-32A188EA1D94",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810204:*:*:*:*:*:*",
"matchCriteriaId": "36A67476-2E8E-4104-9F10-7AE42F82508F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810205:*:*:*:*:*:*",
"matchCriteriaId": "ED029F1A-96D0-4EF2-9148-FC98E8B8FDCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810206:*:*:*:*:*:*",
"matchCriteriaId": "E2283675-582F-44A8-833B-B5B439CBFA1E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810207:*:*:*:*:*:*",
"matchCriteriaId": "94C4A188-6B00-48C4-B7E2-9F70811BF618",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810208:*:*:*:*:*:*",
"matchCriteriaId": "F82943E9-E2D0-49F4-BD32-40E84BA1957E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810209:*:*:*:*:*:*",
"matchCriteriaId": "3ACB68F5-EC73-4C30-8FD3-F6647F9BCCD4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810210:*:*:*:*:*:*",
"matchCriteriaId": "B854BA24-11FD-4D0C-9EFD-A88E64FED4E4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810211:*:*:*:*:*:*",
"matchCriteriaId": "554434AB-763F-4E95-B616-F7594041D511",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810212:*:*:*:*:*:*",
"matchCriteriaId": "CE56E7AC-F63D-4A4B-9B45-0E623973B14B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810213:*:*:*:*:*:*",
"matchCriteriaId": "36664142-0111-42F5-A371-AD2C0DF211EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810214:*:*:*:*:*:*",
"matchCriteriaId": "49EA78B6-8208-4351-88F9-103CA01EF3A1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810215:*:*:*:*:*:*",
"matchCriteriaId": "27AC575F-9AC4-4AA1-A71C-BF9F752295F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810216:*:*:*:*:*:*",
"matchCriteriaId": "4C0F47F3-0509-45AC-8EA9-37246E4E6095",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810217:*:*:*:*:*:*",
"matchCriteriaId": "CE103301-6AEF-4348-8F36-833021739AEF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810218:*:*:*:*:*:*",
"matchCriteriaId": "8D92B2FF-8962-41F9-B019-D83AAAD188FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810219:*:*:*:*:*:*",
"matchCriteriaId": "8E6D5227-3421-412F-9BE0-583AA768446D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810220:*:*:*:*:*:*",
"matchCriteriaId": "BD2F52AF-D7EF-4F57-8F04-B0C6CD3FED63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810221:*:*:*:*:*:*",
"matchCriteriaId": "82BA9EB1-4EFB-4649-92C7-2C307966956E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810222:*:*:*:*:*:*",
"matchCriteriaId": "2133378D-8DFD-48B9-83A1-9FA7DDC68902",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810223:*:*:*:*:*:*",
"matchCriteriaId": "57BF8703-0C83-4BA5-B0F7-FB6E45229685",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810224:*:*:*:*:*:*",
"matchCriteriaId": "DAADDD62-2F6E-4D12-A49F-3D38ACF488E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810225:*:*:*:*:*:*",
"matchCriteriaId": "B5834F35-6D9A-48E5-BB5C-3A7D6CCE36D6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810226:*:*:*:*:*:*",
"matchCriteriaId": "27FA0C0E-B5A2-4619-998B-CFB45496D895",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810227:*:*:*:*:*:*",
"matchCriteriaId": "B98EDBA4-0BA4-4894-B6F6-681117A5C5C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810228:*:*:*:*:*:*",
"matchCriteriaId": "8E756914-2C2A-4999-AAEA-2F6835A29C49",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810229:*:*:*:*:*:*",
"matchCriteriaId": "0AC0C89B-26A3-40F7-855F-5F6B36B77F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810230:*:*:*:*:*:*",
"matchCriteriaId": "5BF2FE18-A90E-429A-98D1-9A97DD0464B0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810231:*:*:*:*:*:*",
"matchCriteriaId": "92289D85-0652-41D1-A6BA-D4B8C7EE1F45",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810232:*:*:*:*:*:*",
"matchCriteriaId": "CF41887D-B145-4D01-9AEF-2E36479B2FA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810233:*:*:*:*:*:*",
"matchCriteriaId": "0FEAF0ED-BD20-4BA6-BB23-1C978B823A11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201810234:*:*:*:*:*:*",
"matchCriteriaId": "36234CE1-FA7E-4534-9720-410435E2BAEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
"matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901001:*:*:*:*:*:*",
"matchCriteriaId": "CD1889D7-3313-4004-AA42-7879E8551413",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901401:*:*:*:*:*:*",
"matchCriteriaId": "494E0B07-CE16-46D4-A89B-4F12A6CECDF4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901402:*:*:*:*:*:*",
"matchCriteriaId": "DD046237-16D7-4A57-9F09-2A6A649368C6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201901403:*:*:*:*:*:*",
"matchCriteriaId": "8343E8DB-1D54-4B82-9254-2E2AFC548609",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201903001:*:*:*:*:*:*",
"matchCriteriaId": "F853B5B8-E8F8-4EA2-90EB-0603F4AADAD5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904001:*:*:*:*:*:*",
"matchCriteriaId": "0169E032-F47A-45E0-BC33-B7DF54EC11BF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201:*:*:*:*:*:*",
"matchCriteriaId": "B0FCF0BB-9905-415A-8E30-DB96CCC49782",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904201-ug:*:*:*:*:*:*",
"matchCriteriaId": "7264CDC9-FB2D-45A9-9307-C197B1052477",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202:*:*:*:*:*:*",
"matchCriteriaId": "0C02E0DF-7656-475B-B028-10406DAB30F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904202-ug:*:*:*:*:*:*",
"matchCriteriaId": "D0538570-759A-441A-BC37-556642C090F9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203:*:*:*:*:*:*",
"matchCriteriaId": "41340C91-4E96-4578-BB96-6758EBE072E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904203-ug:*:*:*:*:*:*",
"matchCriteriaId": "9CF906E5-A846-49BA-925B-C6059FD02BFB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204:*:*:*:*:*:*",
"matchCriteriaId": "FAE29DD3-BFC7-4781-A805-DE379CAB3DD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904204-ug:*:*:*:*:*:*",
"matchCriteriaId": "7D3D0230-53D4-469F-AD46-74F057F6F9B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205:*:*:*:*:*:*",
"matchCriteriaId": "322DC091-A4A1-4534-AB5C-0030114A63D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904205-ug:*:*:*:*:*:*",
"matchCriteriaId": "8D8E89CE-C919-4CDF-98BE-BA9A126B36BA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206:*:*:*:*:*:*",
"matchCriteriaId": "4B23002D-D157-412F-B2ED-CD4504C79987",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904206-ug:*:*:*:*:*:*",
"matchCriteriaId": "73DA1453-4756-4C16-9640-B3B0C6F617DF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207:*:*:*:*:*:*",
"matchCriteriaId": "8A2AE141-7503-4C0B-B0F1-B67A898FDF24",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904207-ug:*:*:*:*:*:*",
"matchCriteriaId": "589EE886-6927-4AEA-903C-155C23B1747A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208:*:*:*:*:*:*",
"matchCriteriaId": "4547B798-9F00-4B28-B667-9D38B9E3591B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904208-ug:*:*:*:*:*:*",
"matchCriteriaId": "3BDDFA27-0D99-4D98-B00F-5D038488BAAE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209:*:*:*:*:*:*",
"matchCriteriaId": "53129601-DDA4-4BF4-8F63-A88890F2D7B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904209-ug:*:*:*:*:*:*",
"matchCriteriaId": "3F931502-8460-4373-92D7-CFD817F4A062",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210:*:*:*:*:*:*",
"matchCriteriaId": "B48B12F8-0B49-404E-A6B4-1F6108687C5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904210-ug:*:*:*:*:*:*",
"matchCriteriaId": "287D4E48-4890-46C2-8B9B-1CE484C9D30A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211:*:*:*:*:*:*",
"matchCriteriaId": "8CED027A-5B1B-44CC-81DA-AAD00D551C84",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904211-ug:*:*:*:*:*:*",
"matchCriteriaId": "A916EB29-ADE4-4D65-BF8E-98B44E466AEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212:*:*:*:*:*:*",
"matchCriteriaId": "94F87F69-37DD-4170-ACA0-742EE8CFD00E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904212-ug:*:*:*:*:*:*",
"matchCriteriaId": "BC024B88-DEDD-49E5-B668-5B00C212B6A9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213:*:*:*:*:*:*",
"matchCriteriaId": "ACC3D191-BB1B-4875-9A58-1E6D53128062",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904213-ug:*:*:*:*:*:*",
"matchCriteriaId": "DB9F131B-46BE-44F8-904B-FD0839926B18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214:*:*:*:*:*:*",
"matchCriteriaId": "BD858E05-6FDE-4EDE-95C7-CA16B66BE7F0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904214-ug:*:*:*:*:*:*",
"matchCriteriaId": "BA2195E5-3BAD-4E90-BE40-A59C0A6A9EBF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215:*:*:*:*:*:*",
"matchCriteriaId": "FFCC4027-ED2E-4993-9C3E-FDEBF94EFF11",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904215-ug:*:*:*:*:*:*",
"matchCriteriaId": "1503D3D9-E1A7-41F9-B26D-0AED8ABE6FA7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216:*:*:*:*:*:*",
"matchCriteriaId": "62772E13-0198-4021-9FB0-59124086B21C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904216-ug:*:*:*:*:*:*",
"matchCriteriaId": "7BD28EE0-808D-4A76-B707-F163527608C5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217:*:*:*:*:*:*",
"matchCriteriaId": "C8A565A1-E4F0-4683-9DD6-D3B595A0B2EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904217-ug:*:*:*:*:*:*",
"matchCriteriaId": "79225541-575F-44FC-8ED6-24BA6A4128EF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218:*:*:*:*:*:*",
"matchCriteriaId": "7B8868CD-EA52-438C-BFDD-EB41C98BA425",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904218-ug:*:*:*:*:*:*",
"matchCriteriaId": "8A4A62CD-A46B-4612-9DC8-7744E6D5EA40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219:*:*:*:*:*:*",
"matchCriteriaId": "2F42557E-2FB2-4902-A6E8-CDDDC5E6CAD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904219-ug:*:*:*:*:*:*",
"matchCriteriaId": "D526CE1D-ED76-44EB-9377-53EF7556E254",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220:*:*:*:*:*:*",
"matchCriteriaId": "00ECE661-E187-4999-B2CC-CF0EBAE83253",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904220-ug:*:*:*:*:*:*",
"matchCriteriaId": "D7E92A1C-40EB-441B-A634-42609527210A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221:*:*:*:*:*:*",
"matchCriteriaId": "6C225598-9636-4095-84FE-DD671F2D6000",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904221-ug:*:*:*:*:*:*",
"matchCriteriaId": "111A10BE-FC5A-4272-9719-1DED62694A7A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222:*:*:*:*:*:*",
"matchCriteriaId": "58C577E8-4B2B-4D91-AFCA-81C7FA04B897",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904222-ug:*:*:*:*:*:*",
"matchCriteriaId": "FC65FCFC-CD55-401A-8986-A1DBF544D228",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223:*:*:*:*:*:*",
"matchCriteriaId": "B7F8E29D-A3C1-4223-BDC3-CCED7C6FC86D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904223-ug:*:*:*:*:*:*",
"matchCriteriaId": "EEBD3AEC-284C-44E1-A4CD-010787114737",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224:*:*:*:*:*:*",
"matchCriteriaId": "41DE747D-30C9-470D-8447-47B8C95311EA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904224-ug:*:*:*:*:*:*",
"matchCriteriaId": "42F87C20-5A00-43C9-A445-50AD716233D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225:*:*:*:*:*:*",
"matchCriteriaId": "9D4D1283-BEC0-4FFC-8DC1-812D7A069F6C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904225-ug:*:*:*:*:*:*",
"matchCriteriaId": "C1412AFC-CBE8-4151-B01D-785F11ACAB85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226:*:*:*:*:*:*",
"matchCriteriaId": "97F27723-5065-4A57-AF07-F9BD35B9B32C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904226-ug:*:*:*:*:*:*",
"matchCriteriaId": "6431DD1F-2269-4AFB-B486-9B6373F41C57",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227:*:*:*:*:*:*",
"matchCriteriaId": "94383F22-6A4B-43A5-BA4D-6D25698DFF00",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904227-ug:*:*:*:*:*:*",
"matchCriteriaId": "3BA5D0CB-E5B0-4C95-91A7-C662BAE01483",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228:*:*:*:*:*:*",
"matchCriteriaId": "0F27B6FA-DFF5-4A67-BA3A-E34F38DC3D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904228-ug:*:*:*:*:*:*",
"matchCriteriaId": "A86BDAB4-3924-45A8-9130-517DEA184FA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229:*:*:*:*:*:*",
"matchCriteriaId": "E58409B9-DCF2-4383-8A39-D7CE0136EFF8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201904229-ug:*:*:*:*:*:*",
"matchCriteriaId": "A6EAE07B-2849-4E3B-B8D0-F68E6440A9D3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201905001:*:*:*:*:*:*",
"matchCriteriaId": "00CF4E83-EA1C-4058-8BCC-09B495255F71",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201906002:*:*:*:*:*:*",
"matchCriteriaId": "86626D15-8D73-48BA-970B-CE661D5BB59A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908101:*:*:*:*:*:*",
"matchCriteriaId": "2308CED4-314E-4CFE-8B1F-7B6CAA637A0C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908102:*:*:*:*:*:*",
"matchCriteriaId": "9969057F-BD3A-474E-8A02-087575A8AA92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908103:*:*:*:*:*:*",
"matchCriteriaId": "7111974A-2A88-4209-8CBB-F872993AE4BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908104:*:*:*:*:*:*",
"matchCriteriaId": "35722902-3652-44F1-89C2-08EB51F2A1B9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908201:*:*:*:*:*:*",
"matchCriteriaId": "E469AC46-D464-4960-8F23-CA59B3DCB7C4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908202:*:*:*:*:*:*",
"matchCriteriaId": "9CAD88F2-F1AA-4DDE-9E27-52090E2BD49A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908203:*:*:*:*:*:*",
"matchCriteriaId": "48F3D2BF-3A1D-4C49-94F5-EDB11E57821C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908204:*:*:*:*:*:*",
"matchCriteriaId": "739948F5-E005-49E3-B412-4E035C7D95E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908205:*:*:*:*:*:*",
"matchCriteriaId": "D1828A75-5088-4992-A06B-A58B62536F4B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908206:*:*:*:*:*:*",
"matchCriteriaId": "58030F5A-82E1-4D54-A8F0-30CAAD4C8402",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908207:*:*:*:*:*:*",
"matchCriteriaId": "9A013753-5E40-4CD8-A649-6CD023E0A970",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908208:*:*:*:*:*:*",
"matchCriteriaId": "F554BC79-A92C-4287-9D94-3657C48E36CE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908209:*:*:*:*:*:*",
"matchCriteriaId": "F82710D4-3FAB-469F-B15C-F22B4786AE42",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908210:*:*:*:*:*:*",
"matchCriteriaId": "BDE7B96D-AD37-406D-AF62-3797E7A55119",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908211:*:*:*:*:*:*",
"matchCriteriaId": "A9C294EC-F0BE-44DA-9073-D29D693F0964",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908212:*:*:*:*:*:*",
"matchCriteriaId": "E05B6CD2-A581-46C2-AEA7-D8A6028FB466",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908213:*:*:*:*:*:*",
"matchCriteriaId": "6CEC1380-E75E-40B5-BDE8-94E12317CCCD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908214:*:*:*:*:*:*",
"matchCriteriaId": "C7B7079D-785C-4941-929A-C82B54809728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908215:*:*:*:*:*:*",
"matchCriteriaId": "A1ADE91B-0682-4EF9-8724-E0AFFF3685C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908216:*:*:*:*:*:*",
"matchCriteriaId": "31F8FFF5-25BD-408D-9089-567AF16BA608",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908217:*:*:*:*:*:*",
"matchCriteriaId": "EE834CFD-5533-4989-8836-D0F07ED4919C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908218:*:*:*:*:*:*",
"matchCriteriaId": "092F9149-6B82-48CD-B90C-87DB36881F5B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908219:*:*:*:*:*:*",
"matchCriteriaId": "B2EA0EC1-0139-403C-AC9B-08D8530F4A73",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908220:*:*:*:*:*:*",
"matchCriteriaId": "5A3ADB57-5A7D-4B75-903C-FCBE1FAE9AA1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201908221:*:*:*:*:*:*",
"matchCriteriaId": "755CCD27-3C87-497F-BDBB-48D3163909A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912001:*:*:*:*:*:*",
"matchCriteriaId": "2635673A-1F6B-4B8D-9C8D-F2FFB9644373",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912101:*:*:*:*:*:*",
"matchCriteriaId": "9C0DDCAC-576E-48B6-B67E-E74DBF6C5250",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912102:*:*:*:*:*:*",
"matchCriteriaId": "1CE71B5C-586B-4829-9A7E-3A008A1C1E35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912401:*:*:*:*:*:*",
"matchCriteriaId": "802A1549-678C-4001-807B-97AD0953B5A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912402:*:*:*:*:*:*",
"matchCriteriaId": "A6024926-4AE4-4609-99DE-E3173A72058A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912403:*:*:*:*:*:*",
"matchCriteriaId": "AB1CAAFF-616A-4455-86CA-0ED553D3D27F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912404:*:*:*:*:*:*",
"matchCriteriaId": "7C2C35E2-EDA5-4B0B-895B-09D2EE6A6B72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201912405:*:*:*:*:*:*",
"matchCriteriaId": "13C713B1-AEA0-40B0-829E-4D0A23808577",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004001:*:*:*:*:*:*",
"matchCriteriaId": "4C501A11-EF97-4402-9366-E624F1CBEDEA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004002:*:*:*:*:*:*",
"matchCriteriaId": "52AE4120-4AAE-4F15-8575-4C480FBF7817",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004301:*:*:*:*:*:*",
"matchCriteriaId": "04BAED99-1BF3-4089-B6E6-0BE505E6D846",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004401:*:*:*:*:*:*",
"matchCriteriaId": "F318EA34-1EB7-484D-B016-3173683B0823",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004402:*:*:*:*:*:*",
"matchCriteriaId": "08254171-3483-4796-AD29-8C8A66BEA7A2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004403:*:*:*:*:*:*",
"matchCriteriaId": "BB87B220-ED25-4818-8E70-A9663CCEF005",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004404:*:*:*:*:*:*",
"matchCriteriaId": "1275D19D-05C0-42F8-8402-647E512DAC72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004405:*:*:*:*:*:*",
"matchCriteriaId": "7D919EB9-F45B-4A4B-9887-7DE98065B766",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004406:*:*:*:*:*:*",
"matchCriteriaId": "6CB29FBD-2AD3-49D0-9F49-AE4DD9192C1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004407:*:*:*:*:*:*",
"matchCriteriaId": "C2ACA3A8-5B40-45C4-B47F-0DCF04D6700F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202004408:*:*:*:*:*:*",
"matchCriteriaId": "92E98665-4919-4D45-88CF-28835DADD6E5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202006001:*:*:*:*:*:*",
"matchCriteriaId": "C0A275B7-DBF3-4332-8B5F-C9CAD84229B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202008001:*:*:*:*:*:*",
"matchCriteriaId": "497F58A2-0A2C-4A59-A73B-31C956EF3CD9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:6.7:670-202010001:*:*:*:*:*:*",
"matchCriteriaId": "18E8632C-E442-4F18-BFE2-96AE5C839F0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0.0:-:*:*:*:*:*:*",
"matchCriteriaId": "70F4DA98-C1D3-489E-958C-B466BEAD772B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:o:vmware:esxi:7.0.0:1.20.16321839:*:*:*:*:*:*",
"matchCriteriaId": "0DB30686-F9E0-4845-BFB6-713043B35736",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "OpenSLP as used in VMware ESXi (7.0 before ESXi_7.0.1-0.0.16850804, 6.7 before ESXi670-202010401-SG, 6.5 before ESXi650-202010401-SG) has a use-after-free issue. A malicious actor residing in the management network who has access to port 427 on an ESXi machine may be able to trigger a use-after-free in the OpenSLP service resulting in remote code execution."
},
{
"lang": "es",
"value": "OpenSLP como es usado en VMware ESXi (versiones 7.0 anteriores a ESXi_7.0.1-0.0.16850804, versiones 6.7 anteriores a ESXi670-202010401-SG, versiones 6.5 anteriores a ESXi650-202010401-SG), presenta un problema de uso de la memoria previamente liberada.\u0026#xa0;Un actor malicioso que reside en la red de administraci\u00f3n y que tiene acceso al puerto 427 en una m\u00e1quina ESXi puede desencadenar un uso de la memoria previamente liberada en el servicio OpenSLP resultando en una ejecuci\u00f3n de c\u00f3digo remota"
}
],
"id": "CVE-2020-3992",
"lastModified": "2025-10-30T20:07:10.097",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "HIGH",
"cvssData": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
],
"cvssMetricV31": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "HIGH",
"baseScore": 9.8,
"baseSeverity": "CRITICAL",
"confidentialityImpact": "HIGH",
"integrityImpact": "HIGH",
"privilegesRequired": "NONE",
"scope": "UNCHANGED",
"userInteraction": "NONE",
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
"version": "3.1"
},
"exploitabilityScore": 3.9,
"impactScore": 5.9,
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
},
"published": "2020-10-20T17:15:12.810",
"references": [
{
"source": "security@vmware.com",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"source": "security@vmware.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
},
{
"source": "security@vmware.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch",
"Vendor Advisory"
],
"url": "https://www.vmware.com/security/advisories/VMSA-2020-0023.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1377/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "https://www.zerodayinitiative.com/advisories/ZDI-20-1385/"
},
{
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"tags": [
"US Government Resource"
],
"url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2020-3992"
}
],
"sourceIdentifier": "security@vmware.com",
"vulnStatus": "Analyzed",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
},
{
"description": [
{
"lang": "en",
"value": "CWE-416"
}
],
"source": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"type": "Secondary"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.