{"uuid": "886049b8-01af-4357-862e-0ffa4c56766b", "vulnerability": {"vulnId": "CVE-2020-3952", "altId": []}, "gcve": {"origin_uuid": "405284c2-e461-4670-8979-7fd2c9755a60", "object_uuid": "886049b8-01af-4357-862e-0ffa4c56766b"}, "status": {"exploited": true, "status_reason": "confirmed", "status_updated_at": "2021-11-03T00:00:00+00:00"}, "characteristics": {}, "timestamps": {"asserted_at": "2021-11-03T00:00:00Z", "recorded_at": "2026-02-02T13:24:01Z", "first_seen_at": "2021-11-03T00:00:00Z"}, "scope": {"notes": "KEV entry: VMware vCenter Server Information Disclosure Vulnerability | Affected: VMware / vCenter Server | Description: VMware vCenter Server contains an information disclosure vulnerability in the VMware Directory Service (vmdir) when the Platform Services Controller (PSC) does not correctly implement access controls. Successful exploitation allows an attacker with network access to port 389 to extract sensitive information. | Required action: Apply updates per vendor instructions. | Due date: 2022-05-03 | Known ransomware campaign use (KEV): Unknown | Notes (KEV): https://nvd.nist.gov/vuln/detail/CVE-2020-3952"}, "evidence": [{"type": "vendor_report", "source": "cisa-kev", "signal": "successful_exploitation", "confidence": 0.8, "details": {"cwes": ["CWE-306"], "feed": "CISA Known Exploited Vulnerabilities Catalog", "product": "vCenter Server", "due_date": "2022-05-03", "date_added": "2021-11-03", "vendorProject": "VMware", "vulnerabilityName": "VMware vCenter Server Information Disclosure Vulnerability", "knownRansomwareCampaignUse": "Unknown"}}], "references": [{"id": "CVE-2020-3952", "url": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2020-3952"}]}
