Search criteria

10 vulnerabilities found for VMware vCenter Server (vCenter Server) by VMware

CVE-2023-20896 (GCVE-0-2023-20896)

Vulnerability from nvd – Published: 2023-06-22 12:00 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.642Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20896",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:54:25.466243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:54:33.109Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd)."
            }
          ],
          "value": "The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:06:28.775Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20896",
    "datePublished": "2023-06-22T12:00:45.390Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2025-02-13T16:40:09.061Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20895 (GCVE-0-2023-20895)

Vulnerability from nvd – Published: 2023-06-22 11:57 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20895",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T18:58:48.469755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T18:59:02.540Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eA malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.\u003c/span\u003e"
            }
          ],
          "value": "The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:07:15.577Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20895",
    "datePublished": "2023-06-22T11:57:15.954Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2025-02-13T16:40:08.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20894 (GCVE-0-2023-20894)

Vulnerability from nvd – Published: 2023-06-22 11:54 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.718Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20894",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T21:22:16.773546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T21:22:35.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption."
            }
          ],
          "value": "The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:06:21.798Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20894",
    "datePublished": "2023-06-22T11:54:04.383Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2025-02-13T16:40:07.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20893 (GCVE-0-2023-20893)

Vulnerability from nvd – Published: 2023-06-22 11:52 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.325Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20893",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:52:15.538467Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:53:41.839Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server."
            }
          ],
          "value": "The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:06:27.336Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20893",
    "datePublished": "2023-06-22T11:52:32.771Z",
    "dateReserved": "2022-11-01T15:41:50.394Z",
    "dateUpdated": "2025-02-13T16:40:07.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20892 (GCVE-0-2023-20892)

Vulnerability from nvd – Published: 2023-06-22 11:47 – Updated: 2025-02-13 16:39
VLAI?
Title
VMware vCenter Server heap-overflow vulnerability
Summary
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.432Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1801"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20892",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:47:18.896428Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:48:19.259Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may exploit\u0026nbsp;\u003cb\u003eheap-overflow vulnerability\u0026nbsp;\u003c/b\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eto execute arbitrary code on the underlying operating system that hosts vCenter Server.\u003c/span\u003e"
            }
          ],
          "value": "The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may exploit\u00a0heap-overflow vulnerability\u00a0to execute arbitrary code on the underlying operating system that hosts vCenter Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:07:04.222Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1801"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware vCenter Server heap-overflow vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20892",
    "datePublished": "2023-06-22T11:47:19.390Z",
    "dateReserved": "2022-11-01T15:41:50.394Z",
    "dateUpdated": "2025-02-13T16:39:51.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20896 (GCVE-0-2023-20896)

Vulnerability from cvelistv5 – Published: 2023-06-22 12:00 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.642Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20896",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:54:25.466243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:54:33.109Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd)."
            }
          ],
          "value": "The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:06:28.775Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20896",
    "datePublished": "2023-06-22T12:00:45.390Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2025-02-13T16:40:09.061Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20895 (GCVE-0-2023-20895)

Vulnerability from cvelistv5 – Published: 2023-06-22 11:57 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20895",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T18:58:48.469755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T18:59:02.540Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eA malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.\u003c/span\u003e"
            }
          ],
          "value": "The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:07:15.577Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20895",
    "datePublished": "2023-06-22T11:57:15.954Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2025-02-13T16:40:08.472Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20894 (GCVE-0-2023-20894)

Vulnerability from cvelistv5 – Published: 2023-06-22 11:54 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.718Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20894",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T21:22:16.773546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T21:22:35.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption."
            }
          ],
          "value": "The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:06:21.798Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20894",
    "datePublished": "2023-06-22T11:54:04.383Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2025-02-13T16:40:07.942Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20893 (GCVE-0-2023-20893)

Vulnerability from cvelistv5 – Published: 2023-06-22 11:52 – Updated: 2025-02-13 16:40
VLAI?
Summary
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.325Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20893",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:52:15.538467Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:53:41.839Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server."
            }
          ],
          "value": "The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:06:27.336Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20893",
    "datePublished": "2023-06-22T11:52:32.771Z",
    "dateReserved": "2022-11-01T15:41:50.394Z",
    "dateUpdated": "2025-02-13T16:40:07.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-20892 (GCVE-0-2023-20892)

Vulnerability from cvelistv5 – Published: 2023-06-22 11:47 – Updated: 2025-02-13 16:39
VLAI?
Title
VMware vCenter Server heap-overflow vulnerability
Summary
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Assigner
Impacted products
Vendor Product Version
VMware VMware vCenter Server (vCenter Server) Affected: 8.0 , < 8.0 U1b (8.0 u1b)
Affected: 7.0 , < 7.0 u3m (7.0 u3m)
Create a notification for this product.
    VMware VMware Cloud Foundation (vCenter Server) Affected: 5.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Affected: 4.x , < 7.0 U3m, 8.0 U1b (7.0 U3m, 8.0 U1b)
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.432Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1801"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20892",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:47:18.896428Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:48:19.259Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may exploit\u0026nbsp;\u003cb\u003eheap-overflow vulnerability\u0026nbsp;\u003c/b\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eto execute arbitrary code on the underlying operating system that hosts vCenter Server.\u003c/span\u003e"
            }
          ],
          "value": "The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may exploit\u00a0heap-overflow vulnerability\u00a0to execute arbitrary code on the underlying operating system that hosts vCenter Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-07-13T22:07:04.222Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1801"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware vCenter Server heap-overflow vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20892",
    "datePublished": "2023-06-22T11:47:19.390Z",
    "dateReserved": "2022-11-01T15:41:50.394Z",
    "dateUpdated": "2025-02-13T16:39:51.341Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}