💥VMware vCenter Server heap-overflow vulnerability – CVE-2023-20892, CVE-2023-20893, CVE-2023-20894, CVE-2023-20895, CVE-2023-20896

Multiple memory corruption vulnerabilities in VMware vCenter Server were privately reported to VMware.

Please update ASAP – Risk: for network access to vCenter Server.

Advisory ID: VMSA-2023-0014
CVSSv3 Range: 5.9 - 8.1
Issue Date:2023-06-22
Response Matrix
ProductCVE IdentifierCVSS
v3
Fixed VerLinks
vCenter Server 8.0CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-208958.18.0 U1bNone
vCenter Server 8.0CVE-2023-208965.98.0 U1bNone
vCenter Server 7.0CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-208958.17.0 U3mNone
vCenter Server 7.0CVE-2023-208965.97.0 U3mNone
Cloud Foundation (vCenter Server) 5.xCVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-208958.18.0 U1bKB88287
Cloud Foundation (vCenter Server) 5.xCVE-2023-208965.98.0 U1bKB88287
Cloud Foundation (vCenter Server) 4.xCVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-208958.17.0 U3mKB88287
Cloud Foundation (vCenter Server) 4.xCVE-2023-208965.97.0 U3mKB88287

VMware vCenter Server heap-overflow vulnerability (CVE-2023-20892)

Description:
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

VMware vCenter Server use-after-free vulnerability (CVE-2023-20893)

Description:
The vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.

VMware vCenter Server out-of-bounds write vulnerability (CVE-2023-20894)

Description:
The vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.

VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20895)

Description:
The vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.

VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20896)

Description:
The vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.

Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).

Response Matrix

vSphere LIVE: Why Upgrade to vSphere 8?

vSphere LIVE: Why Upgrade to vSphere 8?

vSphere LIVE: Why Upgrade to vSphere 8?

We are kicking off vSphere LIVE for the summer. Block your calendar off for next Tuesday, June 13 from 10 to 11 AM Pacific (-0700) to stop by the vSphere YouTube channel, wherein I, Bob Plankers, will be talking about WHY you should upgrade to vSphere 8. We’ll go over some of the big features … Continued The post vSphere LIVE: Why Upgrade to vSphere 8? appeared first on VMware vSphere Blog.


VMware Social Media Advocacy

Retrieving and translating CPUID features for a…

Retrieving and translating CPUID features for a vSphere VM

Retrieving and translating CPUID features for a…

Whether you are using the classic Enhanced vMotion Compatibility (EVC) on a vSphere Cluster or the new Per-VM EVC capability, the usable (user-level) CPU features from an ESXi host are then presented down into a Virtual Machine for consumption. If you wanted to see what which CPU features are exposed for a particular VM or […]


VMware Social Media Advocacy

VMware Aria Operations – Maximizing Your Value

VMware Aria Operations – Maximizing Your Value

VMware Aria Operations – Maximizing Your Value

This video will teach how use the Mulit-Cloud Overview as well as the Launchpad within VMware Aria Operations. This video was designed to show new users some of the features that can be utilized within the first day of deployment. Topics covered include Alerts, Dashboards, Capacity, Rightsizing, Reclamation, Cost, Compliance, and Sustainability.


VMware Social Media Advocacy

Removable drive tray accessory for Supermicro…

Removable drive tray accessory for Supermicro SYS-E302-12x fanless chassis

Removable drive tray accessory for Supermicro…

For those in the market for a small form factor (SFF) Supermicro kit, you might be interested in a new removable drive tray accessory that I was just made aware by the Supermicro team. This new removal drive tray is only compatible with the new Supermicro SYS-E302-12x fanless chassis, which is the foundational chassis for […]


VMware Social Media Advocacy

Home Lab – scripted installation – Part I – vWorld

Home Lab – scripted installation – Part I – vWorld

I was fascinated by VCF, VLC, and other scripts, including those provided by William Lam. I decided to create my own script using PowerShell, which was a lot of fun and helped me develop a deeper understanding. I am hoping that this is the first part of many articles to come. I would like […]


VMware Social Media Advocacy