Multiple memory corruption vulnerabilities in VMware vCenter Server were privately reported to VMware.
Please update ASAP – Risk: for network access to vCenter Server.
Advisory ID: VMSA-2023-0014
CVSSv3 Range: 5.9 - 8.1
Issue Date:2023-06-22
Response Matrix
Product | CVE Identifier | CVSS v3 | Fixed Ver | Links |
vCenter Server 8.0 | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | 8.1 | 8.0 U1b | None |
vCenter Server 8.0 | CVE-2023-20896 | 5.9 | 8.0 U1b | None |
vCenter Server 7.0 | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | 8.1 | 7.0 U3m | None |
vCenter Server 7.0 | CVE-2023-20896 | 5.9 | 7.0 U3m | None |
Cloud Foundation (vCenter Server) 5.x | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | 8.1 | 8.0 U1b | KB88287 |
Cloud Foundation (vCenter Server) 5.x | CVE-2023-20896 | 5.9 | 8.0 U1b | KB88287 |
Cloud Foundation (vCenter Server) 4.x | CVE-2023-20892 CVE-2023-20893 CVE-2023-20894 CVE-2023-20895 | 8.1 | 7.0 U3m | KB88287 |
Cloud Foundation (vCenter Server) 4.x | CVE-2023-20896 | 5.9 | 7.0 U3m | KB88287 |
VMware vCenter Server heap-overflow vulnerability (CVE-2023-20892)
Description:
The vCenter Server contains a heap overflow vulnerability due to the usage of uninitialized memory in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
VMware vCenter Server use-after-free vulnerability (CVE-2023-20893)
Description:
The vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
VMware vCenter Server out-of-bounds write vulnerability (CVE-2023-20894)
Description:
The vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bound write by sending a specially crafted packet leading to memory corruption.
VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20895)
Description:
The vCenter Server contains a memory corruption vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Important severity range with a maximum CVSSv3 base score of 8.1
Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger a memory corruption vulnerability which may bypass authentication.
VMware vCenter Server out-of-bounds read vulnerability (CVE-2023-20896)
Description:
The vCenter Server contains an out-of-bounds read vulnerability in the implementation of the DCERPC protocol. VMware has evaluated the severity of this issue to be in the Moderate severity range with a maximum CVSSv3 base score of 5.9.
Known Attack Vectors:
A malicious actor with network access to vCenter Server may trigger an out-of-bounds read by sending a specially crafted packet leading to denial-of-service of certain services (vmcad, vmdird, and vmafdd).