VMware ESXi (7.0 before ESXi_7.0.0-1.20.16321839, 6.7 before ESXi670-202006401-SG and 6.5 before ESXi650-202005401-SG), Workstation (15.x before 15.5.2), and Fusion (11.x before 11.5.2) contain an information leak in the EHCI USB controller. A malicious actor with local access to a virtual machine may be able to read privileged information contained in the hypervisor's memory. Additional conditions beyond the attacker's control need to be present for exploitation to be possible.
Attack Vector Local
Attack Complexity High
Privileges Required Low
Scope Unchanged
Confidentiality Impact High
Integrity Impact None
Availability Impact None
User Interaction None
No CVSS v3.0
Access Vector Local
Access Complexity Medium
Authentication None
Confidentiality Impact Partial
Integrity Impact None
Availability Impact None
AV:L/AC:M/Au:N/C:P/I:N/A:N
Vendors | Products |
---|---|
Vmware |
|
Configuration 1 [-]
|
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/158459/VMware-ESXi-Use-After-Free-Out-Of-Bounds-Access.html | Exploit Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2020/Jul/22 | Mailing List Third Party Advisory |
https://www.vmware.com/security/advisories/VMSA-2020-0015.html | Vendor Advisory |
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: vmware
Published: 2020-06-25T14:51:48
Updated: 2020-07-17T20:06:10
Reserved: 2019-12-30T00:00:00
Link: CVE-2020-3964
JSON object: View
NVD Information
Status : Analyzed
Published: 2020-06-25T15:15:11.117
Modified: 2022-05-03T13:59:34.327
Link: CVE-2020-3964
JSON object: View
Redhat Information
No data.
CWE