VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain a use-after-free vulnerability in PVNVRAM. A malicious actor with local access to a virtual machine may be able to read privileged information contained in physical memory.
Attack Vector Local
Attack Complexity Low
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Low
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:L/AC:L/Au:N/C:P/I:N/A:N
Vendors | Products |
---|---|
Vmware |
|
Configuration 1 [-]
|
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Jul/22 | Exploit Mailing List Third Party Advisory |
https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: vmware
Published: 2020-06-25T14:50:52
Updated: 2020-07-17T20:06:11
Reserved: 2019-12-30T00:00:00
Link: CVE-2020-3963
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-25T15:15:11.053
Modified: 2023-01-27T16:33:58.720
Link: CVE-2020-3963
JSON object: View
Redhat Information
No data.
CWE