All the vulnerabilites related to VMware - VMware vCenter Server (vCenter Server)
cve-2023-20892
Vulnerability from cvelistv5
Published
2023-06-22 11:47
Modified
2024-12-05 19:48
Summary
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit heap-overflow vulnerability to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Impacted products
Vendor Product Version
VMware VMware Cloud Foundation (vCenter Server) Version: 5.x
Version: 4.x
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.432Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1801"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20892",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:47:18.896428Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:48:19.259Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may exploit\u0026nbsp;\u003cb\u003eheap-overflow vulnerability\u0026nbsp;\u003c/b\u003e\u003cspan style=\"background-color: var(--wht);\"\u003eto execute arbitrary code on the underlying operating system that hosts vCenter Server.\u003c/span\u003e"
            }
          ],
          "value": "The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may exploit\u00a0heap-overflow vulnerability\u00a0to execute arbitrary code on the underlying operating system that hosts vCenter Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-22T11:47:25.876Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1801"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware vCenter Server heap-overflow vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20892",
    "datePublished": "2023-06-22T11:47:19.390Z",
    "dateReserved": "2022-11-01T15:41:50.394Z",
    "dateUpdated": "2024-12-05T19:48:19.259Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20896
Vulnerability from cvelistv5
Published
2023-06-22 12:00
Modified
2024-12-05 19:54
Summary
The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).
Impacted products
Vendor Product Version
VMware VMware Cloud Foundation (vCenter Server) Version: 5.x
Version: 4.x
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.642Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20896",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "partial"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:54:25.466243Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:54:33.109Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd)."
            }
          ],
          "value": "The VMware vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd)."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 5.9,
            "baseSeverity": "MEDIUM",
            "confidentialityImpact": "NONE",
            "integrityImpact": "NONE",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-22T12:00:45.390Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1800"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20896",
    "datePublished": "2023-06-22T12:00:45.390Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2024-12-05T19:54:33.109Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20895
Vulnerability from cvelistv5
Published
2023-06-22 11:57
Modified
2024-12-05 18:59
Summary
The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
Impacted products
Vendor Product Version
VMware VMware Cloud Foundation (vCenter Server) Version: 5.x
Version: 4.x
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.371Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20895",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T18:58:48.469755Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T18:59:02.540Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;\u003cspan style=\"background-color: var(--wht);\"\u003eA malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.\u003c/span\u003e"
            }
          ],
          "value": "The VMware vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-22T11:57:15.954Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1740"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20895",
    "datePublished": "2023-06-22T11:57:15.954Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2024-12-05T18:59:02.540Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20894
Vulnerability from cvelistv5
Published
2023-06-22 11:54
Modified
2024-12-05 21:22
Summary
The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
Impacted products
Vendor Product Version
VMware VMware Cloud Foundation (vCenter Server) Version: 5.x
Version: 4.x
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.718Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20894",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T21:22:16.773546Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T21:22:35.614Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption."
            }
          ],
          "value": "The VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-22T11:54:04.383Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2022-1658"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20894",
    "datePublished": "2023-06-22T11:54:04.383Z",
    "dateReserved": "2022-11-01T15:41:50.395Z",
    "dateUpdated": "2024-12-05T21:22:35.614Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2023-20893
Vulnerability from cvelistv5
Published
2023-06-22 11:52
Modified
2024-12-05 19:53
Summary
The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
Impacted products
Vendor Product Version
VMware VMware Cloud Foundation (vCenter Server) Version: 5.x
Version: 4.x
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T09:21:33.325Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799"
          }
        ],
        "title": "CVE Program Container"
      },
      {
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-20893",
                "options": [
                  {
                    "Exploitation": "poc"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-12-05T19:52:15.538467Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-12-05T19:53:41.839Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "x86",
            "ARM",
            "64 bit",
            "32 bit",
            "MacOS",
            "iOS"
          ],
          "product": "VMware vCenter Server (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0 U1b",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0 u1b"
            },
            {
              "lessThan": "7.0 u3m",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0 u3m"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Windows",
            "Linux",
            "Android",
            "64 bit",
            "32 bit",
            "ARM",
            "x86",
            "MacOS",
            "iOS"
          ],
          "product": "VMware Cloud Foundation (vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "5.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            },
            {
              "lessThan": "7.0 U3m, 8.0 U1b",
              "status": "affected",
              "version": "4.x",
              "versionType": "7.0 U3m, 8.0 U1b"
            }
          ]
        }
      ],
      "datePublic": "2023-06-22T10:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server."
            }
          ],
          "value": "The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 8.1,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-06-22T11:52:32.771Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0014.html"
        },
        {
          "url": "https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-20893",
    "datePublished": "2023-06-22T11:52:32.771Z",
    "dateReserved": "2022-11-01T15:41:50.394Z",
    "dateUpdated": "2024-12-05T19:53:41.839Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}