cve-2023-34048
Vulnerability from cvelistv5
Published
2023-10-25 04:21
Modified
2024-08-19 07:47
Severity ?
Summary
vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.
Impacted products
Vendor Product Version
VMware VMware Cloud Foundation (VMware vCenter Server) Version: 5.x
Version: 4.x
CISA Known exploited vulnerability
Data from the Known Exploited Vulnerabilities Catalog

Date added: 2024-01-22

Due date: 2024-02-12

Required action: Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.

Used in ransomware: Unknown

Notes: https://www.vmware.com/security/advisories/VMSA-2023-0023.html; https://nvd.nist.gov/vuln/detail/CVE-2023-34048

Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "affected": [
          {
            "cpes": [
              "cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vcenter_server",
            "vendor": "vmware",
            "versions": [
              {
                "lessThan": "7.0U3o",
                "status": "affected",
                "version": "7.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "vcenter_server",
            "vendor": "vmware",
            "versions": [
              {
                "lessThan": "8.0U2",
                "status": "affected",
                "version": "8.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "cloud_foundation",
            "vendor": "vmware",
            "versions": [
              {
                "lessThan": "KB88287",
                "status": "affected",
                "version": "4.0",
                "versionType": "custom"
              }
            ]
          },
          {
            "cpes": [
              "cpe:2.3:a:vmware:cloud_foundation:5.0:*:*:*:*:*:*:*"
            ],
            "defaultStatus": "unknown",
            "product": "cloud_foundation",
            "vendor": "vmware",
            "versions": [
              {
                "lessThan": "KB88287",
                "status": "affected",
                "version": "5.0",
                "versionType": "custom"
              }
            ]
          }
        ],
        "metrics": [
          {
            "other": {
              "content": {
                "id": "CVE-2023-34048",
                "options": [
                  {
                    "Exploitation": "active"
                  },
                  {
                    "Automatable": "no"
                  },
                  {
                    "Technical Impact": "total"
                  }
                ],
                "role": "CISA Coordinator",
                "timestamp": "2024-03-11T16:43:59.468773Z",
                "version": "2.0.3"
              },
              "type": "ssvc"
            }
          },
          {
            "other": {
              "content": {
                "dateAdded": "2024-01-22",
                "reference": "https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-34048"
              },
              "type": "kev"
            }
          }
        ],
        "problemTypes": [
          {
            "descriptions": [
              {
                "cweId": "CWE-787",
                "description": "CWE-787 Out-of-bounds Write",
                "lang": "en",
                "type": "CWE"
              }
            ]
          }
        ],
        "providerMetadata": {
          "dateUpdated": "2024-06-04T17:21:08.802Z",
          "orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
          "shortName": "CISA-ADP"
        },
        "title": "CISA ADP Vulnrichment"
      },
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-19T07:47:56.653Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html"
          },
          {
            "url": "https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "VMware vCenter Server",
          "vendor": "VMware",
          "versions": [
            {
              "lessThan": "8.0U2",
              "status": "affected",
              "version": "8.0",
              "versionType": "8.0U2"
            },
            {
              "lessThan": "7.0U3o",
              "status": "affected",
              "version": "7.0",
              "versionType": "7.0U3o"
            }
          ]
        },
        {
          "defaultStatus": "unaffected",
          "platforms": [
            "Linux"
          ],
          "product": "VMware Cloud Foundation (VMware vCenter Server)",
          "vendor": "VMware",
          "versions": [
            {
              "status": "affected",
              "version": "5.x"
            },
            {
              "status": "affected",
              "version": "4.x"
            }
          ]
        }
      ],
      "datePublic": "2023-10-25T03:15:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "supportingMedia": [
            {
              "base64": false,
              "type": "text/html",
              "value": "vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution."
            }
          ],
          "value": "vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution."
        }
      ],
      "metrics": [
        {
          "cvssV3_1": {
            "attackComplexity": "LOW",
            "attackVector": "NETWORK",
            "availabilityImpact": "HIGH",
            "baseScore": 9.8,
            "baseSeverity": "CRITICAL",
            "confidentialityImpact": "HIGH",
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H",
            "version": "3.1"
          },
          "format": "CVSS",
          "scenarios": [
            {
              "lang": "en",
              "value": "GENERAL"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2023-10-25T04:21:42.267Z",
        "orgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
        "shortName": "vmware"
      },
      "references": [
        {
          "url": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html"
        }
      ],
      "source": {
        "discovery": "UNKNOWN"
      },
      "title": "VMware vCenter Server Out-of-Bounds Write Vulnerability",
      "x_generator": {
        "engine": "Vulnogram 0.1.0-dev"
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "dcf2e128-44bd-42ed-91e8-88f912c1401d",
    "assignerShortName": "vmware",
    "cveId": "CVE-2023-34048",
    "datePublished": "2023-10-25T04:21:42.267Z",
    "dateReserved": "2023-05-25T17:21:56.202Z",
    "dateUpdated": "2024-08-19T07:47:56.653Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "vulnerability-lookup:meta": {
    "cisa_known_exploited": {
      "cveID": "CVE-2023-34048",
      "cwes": "[\"CWE-787\"]",
      "dateAdded": "2024-01-22",
      "dueDate": "2024-02-12",
      "knownRansomwareCampaignUse": "Unknown",
      "notes": "https://www.vmware.com/security/advisories/VMSA-2023-0023.html;  https://nvd.nist.gov/vuln/detail/CVE-2023-34048",
      "product": "vCenter Server",
      "requiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "shortDescription": "VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol that allows an attacker to conduct remote code execution.",
      "vendorProject": "VMware",
      "vulnerabilityName": "VMware vCenter Server Out-of-Bounds Write Vulnerability"
    },
    "fkie_nvd": {
      "cisaActionDue": "2024-02-12",
      "cisaExploitAdd": "2024-01-22",
      "cisaRequiredAction": "Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.",
      "cisaVulnerabilityName": "VMware vCenter Server Out-of-Bounds Write Vulnerability",
      "configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*\", \"versionStartIncluding\": \"4.0\", \"versionEndIncluding\": \"5.5\", \"matchCriteriaId\": \"561A702A-DB0C-4E67-AF6C-9994B99DA56C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"5FA81CCD-A05E-498C-820E-21980E92132F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"0EE83406-A3D9-4F75-A1A6-63831CEBEEC1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"FB563627-C9CF-4D8A-B882-9AB65EAE9E15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*\", \"matchCriteriaId\": \"DCA03B2A-48B2-48AD-B8EB-9D7BB2016819\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2392D0F-D7A2-4E01-9212-1BA6C895AEBF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D731C1A-9FE5-461C-97E2-6F45E4CBABE1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"8725E544-2A94-4829-A683-1ECCE57A74A6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*\", \"matchCriteriaId\": \"0FC6765A-6584-45A8-9B21-4951D2EA8939\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*\", \"matchCriteriaId\": \"85DD238C-EF73-44F0-928E-A94FF5C4B378\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*\", \"matchCriteriaId\": \"F4CA36C1-732E-41AE-B847-F7411B753F3D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DA882B6-D811-4E4B-B614-2D48F0B9036E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*\", \"matchCriteriaId\": \"8D30A78E-16D0-4A2E-A2F8-F6073698243E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*\", \"matchCriteriaId\": \"188E103E-9568-4CE0-A984-141B2A9E82D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*\", \"matchCriteriaId\": \"B266439F-E911-4C95-9D27-88DF96DDCCD5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*\", \"matchCriteriaId\": \"6508A908-EF14-4A72-AC75-5DA6F8B98A0E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*\", \"matchCriteriaId\": \"3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*\", \"matchCriteriaId\": \"58597F18-0B23-4D21-9ABA-D9773958F10E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*\", \"matchCriteriaId\": \"ADF46C54-313B-4742-A074-EEA0A6554680\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*\", \"matchCriteriaId\": \"9587F800-57BC-44B6-870E-95691684FC46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*\", \"matchCriteriaId\": \"AD148A75-5076-416D-AFD6-0F281DA0A82B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*\", \"matchCriteriaId\": \"956CEA8C-F8C4-41BD-85B4-44FE3A772E50\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*\", \"matchCriteriaId\": \"008AEA0F-116B-4AF8-B3A7-3041CCE25235\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*\", \"matchCriteriaId\": \"EE486B2F-AED4-4FCE-A674-DFC25844FEFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*\", \"matchCriteriaId\": \"4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*\", \"matchCriteriaId\": \"455DD46E-A071-476D-8914-767485E45F35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*\", \"matchCriteriaId\": \"3A422D04-48DF-4A16-94F8-D5702CC2782D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*\", \"matchCriteriaId\": \"806E9219-CDF4-4E62-978E-334E96A94BA6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*\", \"matchCriteriaId\": \"34D8B182-4E71-4655-8DD8-743A3EF6DC8B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*\", \"matchCriteriaId\": \"CC974CA1-88D3-42E4-BF1F-28870F8171B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFE63984-F69B-4593-9AEC-D179D6D98B08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*\", \"matchCriteriaId\": \"34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*\", \"matchCriteriaId\": \"16F3D992-9F48-4604-9AAF-DC2D1CE98BE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*\", \"matchCriteriaId\": \"C745A7E6-4760-48CD-B7C4-1C2C20217F21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*\", \"matchCriteriaId\": \"A5522514-8ED9-45DB-9036-33FE40D77E7D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*\", \"matchCriteriaId\": \"8C27C660-E917-4944-8B4C-41D9622B76D7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*\", \"matchCriteriaId\": \"56CFB469-B3E6-4503-A47C-D18206D4D19A\"}]}]}]",
      "descriptions": "[{\"lang\": \"en\", \"value\": \"vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.\"}, {\"lang\": \"es\", \"value\": \"vCenter Server contiene una vulnerabilidad de escritura fuera de los l\\u00edmites en la implementaci\\u00f3n del protocolo DCERPC. Un actor malintencionado con acceso a la red de vCenter Server puede desencadenar una escritura fuera de los l\\u00edmites que podr\\u00eda conducir a la ejecuci\\u00f3n remota de c\\u00f3digo.\"}]",
      "id": "CVE-2023-34048",
      "lastModified": "2024-12-20T17:41:40.150",
      "metrics": "{\"cvssMetricV31\": [{\"source\": \"security@vmware.com\", \"type\": \"Secondary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}, {\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.1\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"baseScore\": 9.8, \"baseSeverity\": \"CRITICAL\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"NONE\", \"scope\": \"UNCHANGED\", \"confidentialityImpact\": \"HIGH\", \"integrityImpact\": \"HIGH\", \"availabilityImpact\": \"HIGH\"}, \"exploitabilityScore\": 3.9, \"impactScore\": 5.9}]}",
      "published": "2023-10-25T18:17:27.897",
      "references": "[{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2023-0023.html\", \"source\": \"security@vmware.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Exploit\", \"Third Party Advisory\"]}, {\"url\": \"https://www.vmware.com/security/advisories/VMSA-2023-0023.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}]",
      "sourceIdentifier": "security@vmware.com",
      "vulnStatus": "Analyzed",
      "weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}, {\"source\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"type\": \"Secondary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-787\"}]}]"
    },
    "nvd": "{\"cve\":{\"id\":\"CVE-2023-34048\",\"sourceIdentifier\":\"security@vmware.com\",\"published\":\"2023-10-25T18:17:27.897\",\"lastModified\":\"2024-12-20T17:41:40.150\",\"vulnStatus\":\"Analyzed\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.\"},{\"lang\":\"es\",\"value\":\"vCenter Server contiene una vulnerabilidad de escritura fuera de los l\u00edmites en la implementaci\u00f3n del protocolo DCERPC. Un actor malintencionado con acceso a la red de vCenter Server puede desencadenar una escritura fuera de los l\u00edmites que podr\u00eda conducir a la ejecuci\u00f3n remota de c\u00f3digo.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"security@vmware.com\",\"type\":\"Secondary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9},{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":9.8,\"baseSeverity\":\"CRITICAL\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":3.9,\"impactScore\":5.9}]},\"cisaExploitAdd\":\"2024-01-22\",\"cisaActionDue\":\"2024-02-12\",\"cisaRequiredAction\":\"Apply mitigations per vendor instructions or discontinue use of the product if mitigations are unavailable.\",\"cisaVulnerabilityName\":\"VMware vCenter Server Out-of-Bounds Write Vulnerability\",\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]},{\"source\":\"134c704f-9b21-4f2e-91b3-4a467353bcc0\",\"type\":\"Secondary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-787\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:*:*:*:*:*:*:*:*\",\"versionStartIncluding\":\"4.0\",\"versionEndIncluding\":\"5.5\",\"matchCriteriaId\":\"561A702A-DB0C-4E67-AF6C-9994B99DA56C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FA81CCD-A05E-498C-820E-21980E92132F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EE83406-A3D9-4F75-A1A6-63831CEBEEC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"FB563627-C9CF-4D8A-B882-9AB65EAE9E15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"DCA03B2A-48B2-48AD-B8EB-9D7BB2016819\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:d:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2392D0F-D7A2-4E01-9212-1BA6C895AEBF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D731C1A-9FE5-461C-97E2-6F45E4CBABE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"8725E544-2A94-4829-A683-1ECCE57A74A6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FC6765A-6584-45A8-9B21-4951D2EA8939\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update1d:*:*:*:*:*:*\",\"matchCriteriaId\":\"85DD238C-EF73-44F0-928E-A94FF5C4B378\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2:*:*:*:*:*:*\",\"matchCriteriaId\":\"F4CA36C1-732E-41AE-B847-F7411B753F3D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2a:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DA882B6-D811-4E4B-B614-2D48F0B9036E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2b:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D30A78E-16D0-4A2E-A2F8-F6073698243E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2c:*:*:*:*:*:*\",\"matchCriteriaId\":\"188E103E-9568-4CE0-A984-141B2A9E82D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update2d:*:*:*:*:*:*\",\"matchCriteriaId\":\"B266439F-E911-4C95-9D27-88DF96DDCCD5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3:*:*:*:*:*:*\",\"matchCriteriaId\":\"6508A908-EF14-4A72-AC75-5DA6F8B98A0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3a:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BAD2012-5C82-4EA9-A780-9BF1DA5A18AB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3c:*:*:*:*:*:*\",\"matchCriteriaId\":\"58597F18-0B23-4D21-9ABA-D9773958F10E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3d:*:*:*:*:*:*\",\"matchCriteriaId\":\"ADF46C54-313B-4742-A074-EEA0A6554680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3e:*:*:*:*:*:*\",\"matchCriteriaId\":\"9587F800-57BC-44B6-870E-95691684FC46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3f:*:*:*:*:*:*\",\"matchCriteriaId\":\"AD148A75-5076-416D-AFD6-0F281DA0A82B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3g:*:*:*:*:*:*\",\"matchCriteriaId\":\"956CEA8C-F8C4-41BD-85B4-44FE3A772E50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3h:*:*:*:*:*:*\",\"matchCriteriaId\":\"008AEA0F-116B-4AF8-B3A7-3041CCE25235\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3i:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE486B2F-AED4-4FCE-A674-DFC25844FEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3j:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F73AA9E-51E9-4FA0-813D-AD05FDC3EF94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3k:*:*:*:*:*:*\",\"matchCriteriaId\":\"455DD46E-A071-476D-8914-767485E45F35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3l:*:*:*:*:*:*\",\"matchCriteriaId\":\"3A422D04-48DF-4A16-94F8-D5702CC2782D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3m:*:*:*:*:*:*\",\"matchCriteriaId\":\"806E9219-CDF4-4E62-978E-334E96A94BA6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:7.0:update3n:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D8B182-4E71-4655-8DD8-743A3EF6DC8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC974CA1-88D3-42E4-BF1F-28870F8171B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:a:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFE63984-F69B-4593-9AEC-D179D6D98B08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:b:*:*:*:*:*:*\",\"matchCriteriaId\":\"34D1F3B3-8E3F-4E4D-8EE6-2F593663B5CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:c:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F3D992-9F48-4604-9AAF-DC2D1CE98BE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1:*:*:*:*:*:*\",\"matchCriteriaId\":\"C745A7E6-4760-48CD-B7C4-1C2C20217F21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1a:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5522514-8ED9-45DB-9036-33FE40D77E7D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1b:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C27C660-E917-4944-8B4C-41D9622B76D7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:vmware:vcenter_server:8.0:update1c:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CFB469-B3E6-4503-A47C-D18206D4D19A\"}]}]}],\"references\":[{\"url\":\"https://www.vmware.com/security/advisories/VMSA-2023-0023.html\",\"source\":\"security@vmware.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Exploit\",\"Third Party Advisory\"]},{\"url\":\"https://www.vmware.com/security/advisories/VMSA-2023-0023.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]}]}}",
    "vulnrichment": {
      "containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2023-0023.html\", \"tags\": [\"x_transferred\"]}, {\"url\": \"https://www.vicarius.io/vsociety/posts/understanding-cve-2023-34048-a-zero-day-out-of-bound-write-in-vcenter-server\"}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-19T07:47:56.653Z\"}}, {\"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2023-34048\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"active\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"total\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-03-11T16:43:59.468773Z\"}}}, {\"other\": {\"type\": \"kev\", \"content\": {\"dateAdded\": \"2024-01-22\", \"reference\": \"https://www.cisa.gov/known-exploited-vulnerabilities-catalog?search_api_fulltext=CVE-2023-34048\"}}}], \"affected\": [{\"cpes\": [\"cpe:2.3:a:vmware:vcenter_server:7.0:-:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"vcenter_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"7.0U3o\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:vmware:vcenter_server:8.0:-:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"vcenter_server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.0U2\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:vmware:cloud_foundation:4.0:*:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"cloud_foundation\", \"versions\": [{\"status\": \"affected\", \"version\": \"4.0\", \"lessThan\": \"KB88287\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}, {\"cpes\": [\"cpe:2.3:a:vmware:cloud_foundation:5.0:*:*:*:*:*:*:*\"], \"vendor\": \"vmware\", \"product\": \"cloud_foundation\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0\", \"lessThan\": \"KB88287\", \"versionType\": \"custom\"}], \"defaultStatus\": \"unknown\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"CWE\", \"cweId\": \"CWE-787\", \"description\": \"CWE-787 Out-of-bounds Write\"}]}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-05-16T19:34:08.395Z\"}, \"title\": \"CISA ADP Vulnrichment\"}], \"cna\": {\"title\": \"VMware vCenter Server Out-of-Bounds Write Vulnerability\", \"source\": {\"discovery\": \"UNKNOWN\"}, \"metrics\": [{\"format\": \"CVSS\", \"cvssV3_1\": {\"scope\": \"UNCHANGED\", \"version\": \"3.1\", \"baseScore\": 9.8, \"attackVector\": \"NETWORK\", \"baseSeverity\": \"CRITICAL\", \"vectorString\": \"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H\", \"integrityImpact\": \"HIGH\", \"userInteraction\": \"NONE\", \"attackComplexity\": \"LOW\", \"availabilityImpact\": \"HIGH\", \"privilegesRequired\": \"NONE\", \"confidentialityImpact\": \"HIGH\"}, \"scenarios\": [{\"lang\": \"en\", \"value\": \"GENERAL\"}]}], \"affected\": [{\"vendor\": \"VMware\", \"product\": \"VMware vCenter Server\", \"versions\": [{\"status\": \"affected\", \"version\": \"8.0\", \"lessThan\": \"8.0U2\", \"versionType\": \"8.0U2\"}, {\"status\": \"affected\", \"version\": \"7.0\", \"lessThan\": \"7.0U3o\", \"versionType\": \"7.0U3o\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}, {\"vendor\": \"VMware\", \"product\": \"VMware Cloud Foundation (VMware vCenter Server)\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.x\"}, {\"status\": \"affected\", \"version\": \"4.x\"}], \"platforms\": [\"Linux\"], \"defaultStatus\": \"unaffected\"}], \"datePublic\": \"2023-10-25T03:15:00.000Z\", \"references\": [{\"url\": \"https://www.vmware.com/security/advisories/VMSA-2023-0023.html\"}], \"x_generator\": {\"engine\": \"Vulnogram 0.1.0-dev\"}, \"descriptions\": [{\"lang\": \"en\", \"value\": \"vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\\u00a0A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.\", \"supportingMedia\": [{\"type\": \"text/html\", \"value\": \"vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol.\u0026nbsp;A malicious actor with network access to vCenter Server may trigger an out-of-bounds write potentially leading to remote code execution.\", \"base64\": false}]}], \"providerMetadata\": {\"orgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"shortName\": \"vmware\", \"dateUpdated\": \"2023-10-25T04:21:42.267Z\"}}}",
      "cveMetadata": "{\"cveId\": \"CVE-2023-34048\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-08-19T07:47:56.653Z\", \"dateReserved\": \"2023-05-25T17:21:56.202Z\", \"assignerOrgId\": \"dcf2e128-44bd-42ed-91e8-88f912c1401d\", \"datePublished\": \"2023-10-25T04:21:42.267Z\", \"assignerShortName\": \"vmware\"}",
      "dataType": "CVE_RECORD",
      "dataVersion": "5.1"
    }
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.