All the vulnerabilites related to vmware - vsphere_esxi
cve-2019-5531
Vulnerability from cvelistv5
Published
2019-09-18 21:42
Modified
2024-08-04 20:01
Severity ?
EPSS score ?
Summary
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
References
▼ | URL | Tags |
---|---|---|
http://www.vmware.com/security/advisories/VMSA-2019-0013.html | x_refsource_CONFIRM |
Impacted products
Vendor | Product | Version | |||||
---|---|---|---|---|---|---|---|
▼ | VMware | VMware vSphere ESXi |
Version: 6.7 prior to ESXi670-201810101-SG Version: 6.5 prior to ESXi650-201811102-SG Version: 6.0 prior to ESXi600-201807103-SG |
||||
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T20:01:51.896Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware vSphere ESXi", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 prior to ESXi670-201810101-SG" }, { "status": "affected", "version": "6.5 prior to ESXi650-201811102-SG" }, { "status": "affected", "version": "6.0 prior to ESXi600-201807103-SG" } ] }, { "product": "VMware vCenter Server", "vendor": "VMware", "versions": [ { "status": "affected", "version": "6.7 prior to 6.7 U1b" }, { "status": "affected", "version": "6.5 prior to 6.5 U2b" }, { "status": "affected", "version": "6.0 prior to 6.0 U3j" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out." } ], "problemTypes": [ { "descriptions": [ { "description": "Information disclosure vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2019-09-20T18:18:52", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2019-5531", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware vSphere ESXi", "version": { "version_data": [ { "version_value": "6.7 prior to ESXi670-201810101-SG" }, { "version_value": "6.5 prior to ESXi650-201811102-SG" }, { "version_value": "6.0 prior to ESXi600-201807103-SG" } ] } }, { "product_name": "VMware vCenter Server", "version": { "version_data": [ { "version_value": "6.7 prior to 6.7 U1b" }, { "version_value": "6.5 prior to 6.5 U2b" }, { "version_value": "6.0 prior to 6.0 U3j" } ] } } ] }, "vendor_name": "VMware" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Information disclosure vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html", "refsource": "CONFIRM", "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2019-5531", "datePublished": "2019-09-18T21:42:17", "dateReserved": "2019-01-07T00:00:00", "dateUpdated": "2024-08-04T20:01:51.896Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
cve-2020-3960
Vulnerability from cvelistv5
Published
2021-09-15 12:14
Modified
2024-08-04 07:52
Severity ?
EPSS score ?
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
References
▼ | URL | Tags |
---|---|---|
https://www.vmware.com/security/advisories/VMSA-2020-0012.html | x_refsource_MISC |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
▼ | n/a | VMware ESXi, Workstation, and Fusion |
Version: VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-04T07:52:20.338Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "VMware ESXi, Workstation, and Fusion", "vendor": "n/a", "versions": [ { "status": "affected", "version": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)" } ] } ], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory." } ], "problemTypes": [ { "descriptions": [ { "description": "Out-of-bounds read vulnerability", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2021-09-15T12:14:02", "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "shortName": "vmware" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "security@vmware.com", "ID": "CVE-2020-3960", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "VMware ESXi, Workstation, and Fusion", "version": { "version_data": [ { "version_value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Out-of-bounds read vulnerability" } ] } ] }, "references": { "reference_data": [ { "name": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html", "refsource": "MISC", "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d", "assignerShortName": "vmware", "cveId": "CVE-2020-3960", "datePublished": "2021-09-15T12:14:02", "dateReserved": "2019-12-30T00:00:00", "dateUpdated": "2024-08-04T07:52:20.338Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2019-09-18 22:15
Modified
2024-11-21 04:45
Severity ?
Summary
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*", "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "E4F86FE1-8540-4C89-990E-FE397E2E56C6", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:update_1:*:*:*:*:*:*", "matchCriteriaId": "98469327-DCED-47A0-BE32-54FD6C458329", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vsphere_esxi:6.5:a:*:*:*:*:*:*", "matchCriteriaId": "DA9649FA-E181-426F-A7CD-A7DA407FD60B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vsphere_esxi:6.5:u2:*:*:*:*:*:*", "matchCriteriaId": "172B6B61-9005-4629-8583-7EEC630BF75E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "A6B998A9-208A-41F7-B981-2FA7ABF1E9F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "B0BDCA59-38C7-4E8C-89D1-8CD2F432F106", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "8E77CCBC-B104-4A88-90CF-57DC126CC448", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811002:*:*:*:*:*:*", "matchCriteriaId": "8F151754-8E39-42FC-B853-A8CEA25FA614", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "726C9EF2-7AFB-410A-8EDC-49DCB113AF30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "770D4FA0-4ACC-44F4-96D4-04471DB07118", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "D61873BB-E6F3-4240-B71B-589BD5D3AFBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:update_1:*:*:*:*:*:*", "matchCriteriaId": "43516B10-6F39-45D2-B9A8-1FF8C1633132", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A2FC4AF4-9D52-4FB7-803C-6CD3815FFB27", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201810001:*:*:*:*:*:*", "matchCriteriaId": "7032617B-E855-4DB1-8A7E-AFC716399B0F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201811001:*:*:*:*:*:*", "matchCriteriaId": "E6CD3CEF-1230-4CF4-BD66-74690DBD763C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201903001:*:*:*:*:*:*", "matchCriteriaId": "E6792B87-53C4-42FB-B72B-8FD980B1FE9F", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201905001:*:*:*:*:*:*", "matchCriteriaId": "4EC892F4-2413-41B1-9EFF-6E40FDAEF9AB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:beta:*:*:*:*:*:*", "matchCriteriaId": "23B128C5-926E-4507-9268-E1C776713AA0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:u1a:*:*:*:*:*:*", "matchCriteriaId": "33F8F18E-FFEE-44A4-8D0F-D1F098D94D75", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:u1b:*:*:*:*:*:*", "matchCriteriaId": "967DA5A9-6A83-4F56-BB63-52D31256A848", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:u3a:*:*:*:*:*:*", "matchCriteriaId": "FF8916F0-EE48-495F-A698-EF9264F7E34A", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:update_2:*:*:*:*:*:*", "matchCriteriaId": "21634E09-E32A-4E38-95FE-8E26EFD85557", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:update_3:*:*:*:*:*:*", "matchCriteriaId": "22219B28-4974-449B-A79E-CBBDC16C3131", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "7499E57A-1F9C-45F0-93F8-F3FB7B0F990F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*", "matchCriteriaId": "74EE8EE5-54F0-4359-898B-C57C5B2AE7C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*", "matchCriteriaId": "F83AAB8E-F129-4D1C-A4BC-4CC2C1777F5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*", "matchCriteriaId": "C914E1AB-DF4F-4A68-8893-EDA57E048147", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*", "matchCriteriaId": "7ECFC0C8-C8EC-4E44-9E90-5D4C67B5F339", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u3:*:*:*:*:*:*", "matchCriteriaId": "7E2BAD93-38DE-4C23-8953-4E199996537B", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*", "matchCriteriaId": "8838067B-0AB5-4C6A-B201-73C193FEFA92", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*", "matchCriteriaId": "34EDDB03-6DA9-48FE-B7F2-FBBCDF5D8385", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*", "matchCriteriaId": "2E8C89BF-93F3-419A-83B7-B617A3DF31D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*", "matchCriteriaId": "4E38D9BC-1BFA-45B5-AC25-A6DB3F025D88", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*", "matchCriteriaId": "3F803DFB-4172-4D60-94DE-F20370859617", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*", "matchCriteriaId": "F99ACFA4-3EEF-4151-80E9-701537DB8D99", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*", "matchCriteriaId": "C4591535-4081-4DF7-B115-53D1014C83CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*", "matchCriteriaId": "22C17858-6EBB-4807-A230-3F53670A69FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*", "matchCriteriaId": "77A98613-F61B-4801-840E-6F281A98B381", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*", "matchCriteriaId": "D0122FA8-0D5F-4296-B00B-9BA00CBAE64D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*", "matchCriteriaId": "76F6CA9D-16DB-450B-A226-93FC151AB631", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*", "matchCriteriaId": "D441FEB9-5773-4E20-9B3E-B6F634F773E9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*", "matchCriteriaId": "EEF33103-ECDD-427B-A445-2D7F90202FCB", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*", "matchCriteriaId": "5241C282-A02B-44B2-B6CA-BA3A99F9737C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*", "matchCriteriaId": "04A60AC7-C2EA-4DBF-9743-54D708584AFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*", "matchCriteriaId": "445FA649-B7F4-4AE2-A487-57357AC95241", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*", "matchCriteriaId": "8A91B0C4-F184-459E-AFD3-DE0E351CC964", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*", "matchCriteriaId": "23253631-2655-48A8-9B00-CB984232329C", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*", "matchCriteriaId": "50C2A9A8-0E66-4702-BCD4-74622108E7A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*", "matchCriteriaId": "EE4D3E2A-C32D-408F-B811-EF8BC86F0D34", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*", "matchCriteriaId": "31CA7802-D78D-4BAD-A45A-68B601C010C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*", "matchCriteriaId": "3B98981B-4721-4752-BAB4-361DB5AEB86F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "3D97854C-DE5D-48B4-B5DB-C132E6D4B826", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*", "matchCriteriaId": "CF7DDB0C-3C07-4B5E-8B8A-0542FEE72877", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*", "matchCriteriaId": "1DD16169-A7DF-4604-888C-156A60018E32", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*", "matchCriteriaId": "46FC9F34-C8FA-4AFE-9F4A-7CF9516BD4D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*", "matchCriteriaId": "D26534EB-327B-4ED6-A3E1-005552CB1F9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*", "matchCriteriaId": "7E51F433-1152-4E94-AF77-970230B1A574", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*", "matchCriteriaId": "0064D104-E0D8-481A-9029-D3726A1A9CF4", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*", "matchCriteriaId": "9B4D3F61-6CD9-411F-A205-EB06A57EBB4E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*", "matchCriteriaId": "F72A1E9C-F960-4E8C-A46C-B38209E6349E", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*", "matchCriteriaId": "2C33CE46-F529-4EA9-9344-6ED3BFA7019D", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*", "matchCriteriaId": "9F1D8161-0E02-45C9-BF61-14799AB65E03", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*", "matchCriteriaId": "1F2CB1FF-6118-4875-945D-07BAA3A21FFA", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*", "matchCriteriaId": "1AEDA28A-5C8E-4E95-A377-3BE530DBEAB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*", "matchCriteriaId": "BDDC6510-3116-4578-80C8-8EF044A8370A", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*", "matchCriteriaId": "8678DB48-CB98-4E4C-ADE6-CABA73265FEC", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*", "matchCriteriaId": "DBD9A341-1FBF-4E04-848B-550DEB27261A", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out." }, { "lang": "es", "value": "VMware vSphere ESXi (6.7 anterior a la versi\u00f3n ESXi670-201810101-SG, 6.5 anterior a la versi\u00f3n ESXi650-201811102-SG y 6.0 anterior a la veris\u00f3n ESXi600-201807103-SG) y VMware vCenter Server (6.7 anterior a 6.7 U1b, 6.5 anterior de 6.5 U2b, y 6.0 anterior a 6.0 U3j) contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en clientes que surge de una caducidad de sesi\u00f3n insuficiente. Un atacante con acceso f\u00edsico o la capacidad de imitar una conexi\u00f3n websocket al navegador de un usuario puede obtener el control de una consola VM despu\u00e9s de que el usuario haya cerrado sesi\u00f3n o su sesi\u00f3n haya caducado." } ], "id": "CVE-2019-5531", "lastModified": "2024-11-21T04:45:08.347", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 5.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.4, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N", "version": "3.1" }, "exploitabilityScore": 2.8, "impactScore": 2.5, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2019-09-18T22:15:11.357", "references": [ { "source": "security@vmware.com", "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-613" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2021-09-15 13:15
Modified
2024-11-21 05:32
Severity ?
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
References
▼ | URL | Tags | |
---|---|---|---|
security@vmware.com | https://www.vmware.com/security/advisories/VMSA-2020-0012.html | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.vmware.com/security/advisories/VMSA-2020-0012.html | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
vmware | fusion | * | |
vmware | workstation | * | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.5 | |
vmware | vsphere_esxi | 6.7 | |
vmware | vsphere_esxi | 6.7 | |
vmware | vsphere_esxi | 6.7 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*", "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E", "versionEndExcluding": "11.5.5", "versionStartIncluding": "11.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*", "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073", "versionEndExcluding": "15.5.5", "versionStartIncluding": "15.0.0", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:-:*:*:*:*:*:*", "matchCriteriaId": "771CBCCF-D4DD-496C-9035-BE7262CF64A3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201701001:*:*:*:*:*:*", "matchCriteriaId": "6D115E41-8BCF-40DE-91FF-3E628798E508", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703001:*:*:*:*:*:*", "matchCriteriaId": "4446F0C9-9058-477C-913B-7524BA99D797", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703002:*:*:*:*:*:*", "matchCriteriaId": "826B35FB-463E-4424-AE91-25BE01F834F3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201704001:*:*:*:*:*:*", "matchCriteriaId": "FACE25FD-7C13-4AB5-AC27-B1AB781AEDDE", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201710001:*:*:*:*:*:*", "matchCriteriaId": "8084D8F6-D495-452D-BD55-C515AC58750E", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201712001:*:*:*:*:*:*", "matchCriteriaId": "B9A6A017-A7C5-4E7F-B65A-6F309A184FE9", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201803001:*:*:*:*:*:*", "matchCriteriaId": "B0F57EDD-831B-4219-A26D-1636F04CD6EC", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201806001:*:*:*:*:*:*", "matchCriteriaId": "3477D987-3CA6-4623-8D88-4FBE5EBA7C5B", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201808001:*:*:*:*:*:*", "matchCriteriaId": "274224EC-AE21-4E89-9F34-D56C1D6FCC0C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810001:*:*:*:*:*:*", "matchCriteriaId": "2607A74F-EDEE-4DC6-BF43-09C62478B9C3", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*", "matchCriteriaId": "B0BDCA59-38C7-4E8C-89D1-8CD2F432F106", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*", "matchCriteriaId": "8E77CCBC-B104-4A88-90CF-57DC126CC448", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*", "matchCriteriaId": "726C9EF2-7AFB-410A-8EDC-49DCB113AF30", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*", "matchCriteriaId": "770D4FA0-4ACC-44F4-96D4-04471DB07118", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*", "matchCriteriaId": "D61873BB-E6F3-4240-B71B-589BD5D3AFBB", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201908001:*:*:*:*:*:*", "matchCriteriaId": "6E2CC1EE-B752-40F4-B812-72973AFE655D", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201910001:*:*:*:*:*:*", "matchCriteriaId": "92C790A1-9A34-47AB-A8A3-3B97F7265D90", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:-:*:*:*:*:*:*", "matchCriteriaId": "1DD7FAF3-15A4-445A-9B3A-722FD8423E21", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:670-201911001:*:*:*:*:*:*", "matchCriteriaId": "7E417BA1-0441-42CB-96AB-93C52569779C", "vulnerable": true }, { "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:670-202004001:*:*:*:*:*:*", "matchCriteriaId": "ECEBAC19-29B3-4148-BA85-F127D4ED1B0F", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory." }, { "lang": "es", "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-202006401-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5.5) contienen una vulnerabilidad de lectura fuera de l\u00edmites en la funcionalidad NVMe. Un actor malicioso con acceso local no administrativo a una m\u00e1quina virtual con un controlador NVMe virtual presente puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria f\u00edsica" } ], "id": "CVE-2020-3960", "lastModified": "2024-11-21T05:32:03.360", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "LOW", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 4.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "LOW", "scope": "CHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H", "version": "3.1" }, "exploitabilityScore": 2.0, "impactScore": 5.8, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2021-09-15T13:15:07.577", "references": [ { "source": "security@vmware.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html" } ], "sourceIdentifier": "security@vmware.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-125" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }