The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 07:41
Type | Values Removed | Values Added |
---|---|---|
References | () https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799 - | |
References | () https://www.vmware.com/security/advisories/VMSA-2023-0014.html - Patch, Vendor Advisory | |
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.1 |
13 Jul 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Jun 2023, 20:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-22 12:15
Updated : 2024-11-21 07:41
NVD link : CVE-2023-20893
Mitre link : CVE-2023-20893
CVE.ORG link : CVE-2023-20893
JSON object : View
Products Affected
vmware
- vcenter_server
CWE
CWE-416
Use After Free