Search criteria

6 vulnerabilities found for vsphere_esxi by vmware

FKIE_CVE-2020-3960

Vulnerability from fkie_nvd - Published: 2021-09-15 13:15 - Updated: 2024-11-21 05:32
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vmware:fusion:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "8CD44672-26F4-4B0F-933E-C929B32E3C9E",
              "versionEndExcluding": "11.5.5",
              "versionStartIncluding": "11.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:workstation:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "FEDE60F7-0DD8-43BD-9780-40058AFDB073",
              "versionEndExcluding": "15.5.5",
              "versionStartIncluding": "15.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:-:*:*:*:*:*:*",
              "matchCriteriaId": "771CBCCF-D4DD-496C-9035-BE7262CF64A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201701001:*:*:*:*:*:*",
              "matchCriteriaId": "6D115E41-8BCF-40DE-91FF-3E628798E508",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703001:*:*:*:*:*:*",
              "matchCriteriaId": "4446F0C9-9058-477C-913B-7524BA99D797",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201703002:*:*:*:*:*:*",
              "matchCriteriaId": "826B35FB-463E-4424-AE91-25BE01F834F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201704001:*:*:*:*:*:*",
              "matchCriteriaId": "FACE25FD-7C13-4AB5-AC27-B1AB781AEDDE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201710001:*:*:*:*:*:*",
              "matchCriteriaId": "8084D8F6-D495-452D-BD55-C515AC58750E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201712001:*:*:*:*:*:*",
              "matchCriteriaId": "B9A6A017-A7C5-4E7F-B65A-6F309A184FE9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201803001:*:*:*:*:*:*",
              "matchCriteriaId": "B0F57EDD-831B-4219-A26D-1636F04CD6EC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201806001:*:*:*:*:*:*",
              "matchCriteriaId": "3477D987-3CA6-4623-8D88-4FBE5EBA7C5B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201808001:*:*:*:*:*:*",
              "matchCriteriaId": "274224EC-AE21-4E89-9F34-D56C1D6FCC0C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810001:*:*:*:*:*:*",
              "matchCriteriaId": "2607A74F-EDEE-4DC6-BF43-09C62478B9C3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*",
              "matchCriteriaId": "B0BDCA59-38C7-4E8C-89D1-8CD2F432F106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*",
              "matchCriteriaId": "8E77CCBC-B104-4A88-90CF-57DC126CC448",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*",
              "matchCriteriaId": "726C9EF2-7AFB-410A-8EDC-49DCB113AF30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*",
              "matchCriteriaId": "770D4FA0-4ACC-44F4-96D4-04471DB07118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*",
              "matchCriteriaId": "D61873BB-E6F3-4240-B71B-589BD5D3AFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201908001:*:*:*:*:*:*",
              "matchCriteriaId": "6E2CC1EE-B752-40F4-B812-72973AFE655D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201910001:*:*:*:*:*:*",
              "matchCriteriaId": "92C790A1-9A34-47AB-A8A3-3B97F7265D90",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:-:*:*:*:*:*:*",
              "matchCriteriaId": "1DD7FAF3-15A4-445A-9B3A-722FD8423E21",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:670-201911001:*:*:*:*:*:*",
              "matchCriteriaId": "7E417BA1-0441-42CB-96AB-93C52569779C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:670-202004001:*:*:*:*:*:*",
              "matchCriteriaId": "ECEBAC19-29B3-4148-BA85-F127D4ED1B0F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory."
    },
    {
      "lang": "es",
      "value": "VMware ESXi (versiones 6.7 anteriores a ESXi670-202006401-SG y versiones 6.5 anteriores a ESXi650-202005401-SG), Workstation (versiones 15.x anteriores a 15.5.5) y Fusion (versiones 11.x anteriores a 11.5.5) contienen una vulnerabilidad de lectura fuera de l\u00edmites en la funcionalidad NVMe. Un actor malicioso con acceso local no administrativo a una m\u00e1quina virtual con un controlador NVMe virtual presente puede ser capaz de leer informaci\u00f3n privilegiada contenida en la memoria f\u00edsica"
    }
  ],
  "id": "CVE-2020-3960",
  "lastModified": "2024-11-21T05:32:03.360",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "LOW",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 3.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "NONE",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "LOCAL",
          "availabilityImpact": "HIGH",
          "baseScore": 8.4,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "HIGH",
          "integrityImpact": "NONE",
          "privilegesRequired": "LOW",
          "scope": "CHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:C/C:H/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 2.0,
        "impactScore": 5.8,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2021-09-15T13:15:07.577",
  "references": [
    {
      "source": "security@vmware.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
    }
  ],
  "sourceIdentifier": "security@vmware.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-125"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

FKIE_CVE-2019-5531

Vulnerability from fkie_nvd - Published: 2019-09-18 22:15 - Updated: 2024-11-21 04:45
Summary
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
Impacted products
Vendor Product Version
vmware esxi 6.7
vmware vsphere_esxi 6.7
vmware vsphere_esxi 6.7
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.5
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vsphere_esxi 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.0
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.7
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5
vmware vcenter_server 6.5

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:vmware:esxi:6.7:670-201811001:*:*:*:*:*:*",
              "matchCriteriaId": "ABE65721-57C0-4748-B159-F6D97CE8CAB9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "E4F86FE1-8540-4C89-990E-FE397E2E56C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.7:update_1:*:*:*:*:*:*",
              "matchCriteriaId": "98469327-DCED-47A0-BE32-54FD6C458329",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vmware:vsphere_esxi:6.5:a:*:*:*:*:*:*",
              "matchCriteriaId": "DA9649FA-E181-426F-A7CD-A7DA407FD60B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vsphere_esxi:6.5:u2:*:*:*:*:*:*",
              "matchCriteriaId": "172B6B61-9005-4629-8583-7EEC630BF75E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "A6B998A9-208A-41F7-B981-2FA7ABF1E9F0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201810002:*:*:*:*:*:*",
              "matchCriteriaId": "B0BDCA59-38C7-4E8C-89D1-8CD2F432F106",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811001:*:*:*:*:*:*",
              "matchCriteriaId": "8E77CCBC-B104-4A88-90CF-57DC126CC448",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201811002:*:*:*:*:*:*",
              "matchCriteriaId": "8F151754-8E39-42FC-B853-A8CEA25FA614",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201901001:*:*:*:*:*:*",
              "matchCriteriaId": "726C9EF2-7AFB-410A-8EDC-49DCB113AF30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201903001:*:*:*:*:*:*",
              "matchCriteriaId": "770D4FA0-4ACC-44F4-96D4-04471DB07118",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:650-201905001:*:*:*:*:*:*",
              "matchCriteriaId": "D61873BB-E6F3-4240-B71B-589BD5D3AFBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.5:update_1:*:*:*:*:*:*",
              "matchCriteriaId": "43516B10-6F39-45D2-B9A8-1FF8C1633132",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2FC4AF4-9D52-4FB7-803C-6CD3815FFB27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201810001:*:*:*:*:*:*",
              "matchCriteriaId": "7032617B-E855-4DB1-8A7E-AFC716399B0F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201811001:*:*:*:*:*:*",
              "matchCriteriaId": "E6CD3CEF-1230-4CF4-BD66-74690DBD763C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201903001:*:*:*:*:*:*",
              "matchCriteriaId": "E6792B87-53C4-42FB-B72B-8FD980B1FE9F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:600-201905001:*:*:*:*:*:*",
              "matchCriteriaId": "4EC892F4-2413-41B1-9EFF-6E40FDAEF9AB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:beta:*:*:*:*:*:*",
              "matchCriteriaId": "23B128C5-926E-4507-9268-E1C776713AA0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:u1a:*:*:*:*:*:*",
              "matchCriteriaId": "33F8F18E-FFEE-44A4-8D0F-D1F098D94D75",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:u1b:*:*:*:*:*:*",
              "matchCriteriaId": "967DA5A9-6A83-4F56-BB63-52D31256A848",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:u3a:*:*:*:*:*:*",
              "matchCriteriaId": "FF8916F0-EE48-495F-A698-EF9264F7E34A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:update_2:*:*:*:*:*:*",
              "matchCriteriaId": "21634E09-E32A-4E38-95FE-8E26EFD85557",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:vmware:vsphere_esxi:6.0:update_3:*:*:*:*:*:*",
              "matchCriteriaId": "22219B28-4974-449B-A79E-CBBDC16C3131",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "7499E57A-1F9C-45F0-93F8-F3FB7B0F990F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:a:*:*:*:*:*:*",
              "matchCriteriaId": "74EE8EE5-54F0-4359-898B-C57C5B2AE7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:b:*:*:*:*:*:*",
              "matchCriteriaId": "F83AAB8E-F129-4D1C-A4BC-4CC2C1777F5F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u1:*:*:*:*:*:*",
              "matchCriteriaId": "C914E1AB-DF4F-4A68-8893-EDA57E048147",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u1b:*:*:*:*:*:*",
              "matchCriteriaId": "7ECFC0C8-C8EC-4E44-9E90-5D4C67B5F339",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:u3:*:*:*:*:*:*",
              "matchCriteriaId": "7E2BAD93-38DE-4C23-8953-4E199996537B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2:*:*:*:*:*:*",
              "matchCriteriaId": "8838067B-0AB5-4C6A-B201-73C193FEFA92",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2a:*:*:*:*:*:*",
              "matchCriteriaId": "34EDDB03-6DA9-48FE-B7F2-FBBCDF5D8385",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update2m:*:*:*:*:*:*",
              "matchCriteriaId": "2E8C89BF-93F3-419A-83B7-B617A3DF31D7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3a:*:*:*:*:*:*",
              "matchCriteriaId": "4E38D9BC-1BFA-45B5-AC25-A6DB3F025D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3b:*:*:*:*:*:*",
              "matchCriteriaId": "3F803DFB-4172-4D60-94DE-F20370859617",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3c:*:*:*:*:*:*",
              "matchCriteriaId": "F99ACFA4-3EEF-4151-80E9-701537DB8D99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3d:*:*:*:*:*:*",
              "matchCriteriaId": "C4591535-4081-4DF7-B115-53D1014C83CA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3e:*:*:*:*:*:*",
              "matchCriteriaId": "22C17858-6EBB-4807-A230-3F53670A69FB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3f:*:*:*:*:*:*",
              "matchCriteriaId": "77A98613-F61B-4801-840E-6F281A98B381",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3g:*:*:*:*:*:*",
              "matchCriteriaId": "D0122FA8-0D5F-4296-B00B-9BA00CBAE64D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3h:*:*:*:*:*:*",
              "matchCriteriaId": "76F6CA9D-16DB-450B-A226-93FC151AB631",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.0:update3i:*:*:*:*:*:*",
              "matchCriteriaId": "D441FEB9-5773-4E20-9B3E-B6F634F773E9",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EEF33103-ECDD-427B-A445-2D7F90202FCB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:a:*:*:*:*:*:*",
              "matchCriteriaId": "5241C282-A02B-44B2-B6CA-BA3A99F9737C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:b:*:*:*:*:*:*",
              "matchCriteriaId": "04A60AC7-C2EA-4DBF-9743-54D708584AFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:c:*:*:*:*:*:*",
              "matchCriteriaId": "445FA649-B7F4-4AE2-A487-57357AC95241",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:d:*:*:*:*:*:*",
              "matchCriteriaId": "8A91B0C4-F184-459E-AFD3-DE0E351CC964",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1:*:*:*:*:*:*",
              "matchCriteriaId": "23253631-2655-48A8-9B00-CB984232329C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update1b:*:*:*:*:*:*",
              "matchCriteriaId": "50C2A9A8-0E66-4702-BCD4-74622108E7A6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2:*:*:*:*:*:*",
              "matchCriteriaId": "EE4D3E2A-C32D-408F-B811-EF8BC86F0D34",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2a:*:*:*:*:*:*",
              "matchCriteriaId": "31CA7802-D78D-4BAD-A45A-68B601C010C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.7:update2c:*:*:*:*:*:*",
              "matchCriteriaId": "3B98981B-4721-4752-BAB4-361DB5AEB86F",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "3D97854C-DE5D-48B4-B5DB-C132E6D4B826",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:a:*:*:*:*:*:*",
              "matchCriteriaId": "CF7DDB0C-3C07-4B5E-8B8A-0542FEE72877",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:b:*:*:*:*:*:*",
              "matchCriteriaId": "1DD16169-A7DF-4604-888C-156A60018E32",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:c:*:*:*:*:*:*",
              "matchCriteriaId": "46FC9F34-C8FA-4AFE-9F4A-7CF9516BD4D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:d:*:*:*:*:*:*",
              "matchCriteriaId": "D26534EB-327B-4ED6-A3E1-005552CB1F9D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1:*:*:*:*:*:*",
              "matchCriteriaId": "7E51F433-1152-4E94-AF77-970230B1A574",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1b:*:*:*:*:*:*",
              "matchCriteriaId": "0064D104-E0D8-481A-9029-D3726A1A9CF4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1c:*:*:*:*:*:*",
              "matchCriteriaId": "9B4D3F61-6CD9-411F-A205-EB06A57EBB4E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1d:*:*:*:*:*:*",
              "matchCriteriaId": "F72A1E9C-F960-4E8C-A46C-B38209E6349E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1e:*:*:*:*:*:*",
              "matchCriteriaId": "2C33CE46-F529-4EA9-9344-6ED3BFA7019D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update1g:*:*:*:*:*:*",
              "matchCriteriaId": "9F1D8161-0E02-45C9-BF61-14799AB65E03",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2:*:*:*:*:*:*",
              "matchCriteriaId": "1F2CB1FF-6118-4875-945D-07BAA3A21FFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2b:*:*:*:*:*:*",
              "matchCriteriaId": "1AEDA28A-5C8E-4E95-A377-3BE530DBEAB5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2c:*:*:*:*:*:*",
              "matchCriteriaId": "BDDC6510-3116-4578-80C8-8EF044A8370A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2d:*:*:*:*:*:*",
              "matchCriteriaId": "8678DB48-CB98-4E4C-ADE6-CABA73265FEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:vmware:vcenter_server:6.5:update2g:*:*:*:*:*:*",
              "matchCriteriaId": "DBD9A341-1FBF-4E04-848B-550DEB27261A",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
    },
    {
      "lang": "es",
      "value": "VMware vSphere ESXi (6.7 anterior a la versi\u00f3n ESXi670-201810101-SG, 6.5 anterior a la versi\u00f3n  ESXi650-201811102-SG y 6.0 anterior a la veris\u00f3n ESXi600-201807103-SG) y VMware vCenter Server (6.7 anterior a 6.7 U1b, 6.5 anterior de 6.5 U2b, y 6.0 anterior a 6.0 U3j) contiene una vulnerabilidad de divulgaci\u00f3n de informaci\u00f3n en clientes que surge de una caducidad de sesi\u00f3n insuficiente. Un atacante con acceso f\u00edsico o la capacidad de imitar una conexi\u00f3n websocket al navegador de un usuario puede obtener el control de una consola VM despu\u00e9s de que el usuario haya cerrado sesi\u00f3n o su sesi\u00f3n haya caducado."
    }
  ],
  "id": "CVE-2019-5531",
  "lastModified": "2024-11-21T04:45:08.347",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "NONE",
          "baseScore": 5.8,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 4.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "NONE",
          "baseScore": 5.4,
          "baseSeverity": "MEDIUM",
          "confidentialityImpact": "LOW",
          "integrityImpact": "LOW",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "REQUIRED",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:L/A:N",
          "version": "3.1"
        },
        "exploitabilityScore": 2.8,
        "impactScore": 2.5,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2019-09-18T22:15:11.357",
  "references": [
    {
      "source": "security@vmware.com",
      "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
    }
  ],
  "sourceIdentifier": "security@vmware.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-613"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2020-3960 (GCVE-0-2020-3960)

Vulnerability from cvelistv5 – Published: 2021-09-15 12:14 – Updated: 2024-08-04 07:52
VLAI?
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
Severity ?
No CVSS data available.
CWE
  • Out-of-bounds read vulnerability
Assigner
References
Impacted products
Vendor Product Version
n/a VMware ESXi, Workstation, and Fusion Affected: VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:20.338Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware ESXi, Workstation, and Fusion",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Out-of-bounds read vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-15T12:14:02",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2020-3960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware ESXi, Workstation, and Fusion",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Out-of-bounds read vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html",
              "refsource": "MISC",
              "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2020-3960",
    "datePublished": "2021-09-15T12:14:02",
    "dateReserved": "2019-12-30T00:00:00",
    "dateUpdated": "2024-08-04T07:52:20.338Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5531 (GCVE-0-2019-5531)

Vulnerability from cvelistv5 – Published: 2019-09-18 21:42 – Updated: 2024-08-04 20:01
VLAI?
Summary
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
Severity ?
No CVSS data available.
CWE
  • Information disclosure vulnerability
Assigner
References
Impacted products
Vendor Product Version
VMware VMware vSphere ESXi Affected: 6.7 prior to ESXi670-201810101-SG
Affected: 6.5 prior to ESXi650-201811102-SG
Affected: 6.0 prior to ESXi600-201807103-SG
Create a notification for this product.
    VMware VMware vCenter Server Affected: 6.7 prior to 6.7 U1b
Affected: 6.5 prior to 6.5 U2b
Affected: 6.0 prior to 6.0 U3j
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:01:51.896Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware vSphere ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 prior to ESXi670-201810101-SG"
            },
            {
              "status": "affected",
              "version": "6.5 prior to ESXi650-201811102-SG"
            },
            {
              "status": "affected",
              "version": "6.0 prior to ESXi600-201807103-SG"
            }
          ]
        },
        {
          "product": "VMware vCenter Server",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 prior to 6.7 U1b"
            },
            {
              "status": "affected",
              "version": "6.5 prior to 6.5 U2b"
            },
            {
              "status": "affected",
              "version": "6.0 prior to 6.0 U3j"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information disclosure vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-20T18:18:52",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2019-5531",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware vSphere ESXi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 prior to ESXi670-201810101-SG"
                          },
                          {
                            "version_value": "6.5 prior to ESXi650-201811102-SG"
                          },
                          {
                            "version_value": "6.0 prior to ESXi600-201807103-SG"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "VMware vCenter Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 prior to 6.7 U1b"
                          },
                          {
                            "version_value": "6.5 prior to 6.5 U2b"
                          },
                          {
                            "version_value": "6.0 prior to 6.0 U3j"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information disclosure vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2019-5531",
    "datePublished": "2019-09-18T21:42:17",
    "dateReserved": "2019-01-07T00:00:00",
    "dateUpdated": "2024-08-04T20:01:51.896Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2020-3960 (GCVE-0-2020-3960)

Vulnerability from nvd – Published: 2021-09-15 12:14 – Updated: 2024-08-04 07:52
VLAI?
Summary
VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory.
Severity ?
No CVSS data available.
CWE
  • Out-of-bounds read vulnerability
Assigner
References
Impacted products
Vendor Product Version
n/a VMware ESXi, Workstation, and Fusion Affected: VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T07:52:20.338Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware ESXi, Workstation, and Fusion",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Out-of-bounds read vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2021-09-15T12:14:02",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2020-3960",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware ESXi, Workstation, and Fusion",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5)"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware ESXi (6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.5), and Fusion (11.x before 11.5.5) contain an out-of-bounds read vulnerability in NVMe functionality. A malicious actor with local non-administrative access to a virtual machine with a virtual NVMe controller present may be able to read privileged information contained in physical memory."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Out-of-bounds read vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html",
              "refsource": "MISC",
              "url": "https://www.vmware.com/security/advisories/VMSA-2020-0012.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2020-3960",
    "datePublished": "2021-09-15T12:14:02",
    "dateReserved": "2019-12-30T00:00:00",
    "dateUpdated": "2024-08-04T07:52:20.338Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2019-5531 (GCVE-0-2019-5531)

Vulnerability from nvd – Published: 2019-09-18 21:42 – Updated: 2024-08-04 20:01
VLAI?
Summary
VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user’s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out.
Severity ?
No CVSS data available.
CWE
  • Information disclosure vulnerability
Assigner
References
Impacted products
Vendor Product Version
VMware VMware vSphere ESXi Affected: 6.7 prior to ESXi670-201810101-SG
Affected: 6.5 prior to ESXi650-201811102-SG
Affected: 6.0 prior to ESXi600-201807103-SG
Create a notification for this product.
    VMware VMware vCenter Server Affected: 6.7 prior to 6.7 U1b
Affected: 6.5 prior to 6.5 U2b
Affected: 6.0 prior to 6.0 U3j
Create a notification for this product.
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-04T20:01:51.896Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "VMware vSphere ESXi",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 prior to ESXi670-201810101-SG"
            },
            {
              "status": "affected",
              "version": "6.5 prior to ESXi650-201811102-SG"
            },
            {
              "status": "affected",
              "version": "6.0 prior to ESXi600-201807103-SG"
            }
          ]
        },
        {
          "product": "VMware vCenter Server",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "6.7 prior to 6.7 U1b"
            },
            {
              "status": "affected",
              "version": "6.5 prior to 6.5 U2b"
            },
            {
              "status": "affected",
              "version": "6.0 prior to 6.0 U3j"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "Information disclosure vulnerability",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2019-09-20T18:18:52",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "security@vmware.com",
          "ID": "CVE-2019-5531",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "VMware vSphere ESXi",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 prior to ESXi670-201810101-SG"
                          },
                          {
                            "version_value": "6.5 prior to ESXi650-201811102-SG"
                          },
                          {
                            "version_value": "6.0 prior to ESXi600-201807103-SG"
                          }
                        ]
                      }
                    },
                    {
                      "product_name": "VMware vCenter Server",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "6.7 prior to 6.7 U1b"
                          },
                          {
                            "version_value": "6.5 prior to 6.5 U2b"
                          },
                          {
                            "version_value": "6.0 prior to 6.0 U3j"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "VMware"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "VMware vSphere ESXi (6.7 prior to ESXi670-201810101-SG, 6.5 prior to ESXi650-201811102-SG, and 6.0 prior to ESXi600-201807103-SG) and VMware vCenter Server (6.7 prior to 6.7 U1b, 6.5 prior to 6.5 U2b, and 6.0 prior to 6.0 U3j) contain an information disclosure vulnerability in clients arising from insufficient session expiration. An attacker with physical access or an ability to mimic a websocket connection to a user\u2019s browser may be able to obtain control of a VM Console after the user has logged out or their session has timed out."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "Information disclosure vulnerability"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html",
              "refsource": "CONFIRM",
              "url": "http://www.vmware.com/security/advisories/VMSA-2019-0013.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2019-5531",
    "datePublished": "2019-09-18T21:42:17",
    "dateReserved": "2019-01-07T00:00:00",
    "dateUpdated": "2024-08-04T20:01:51.896Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}