The VMware vCenter Server contains a use-after-free vulnerability in the implementation of the DCERPC protocol. A malicious actor with network access to vCenter Server may exploit this issue to execute arbitrary code on the underlying operating system that hosts vCenter Server.
References
Link | Resource |
---|---|
https://www.talosintelligence.com/vulnerability_reports/TALOS-2023-1799 | |
https://www.vmware.com/security/advisories/VMSA-2023-0014.html | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
13 Jul 2023, 23:15
Type | Values Removed | Values Added |
---|---|---|
References |
|
28 Jun 2023, 20:54
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-06-22 12:15
Updated : 2024-02-04 23:37
NVD link : CVE-2023-20893
Mitre link : CVE-2023-20893
CVE.ORG link : CVE-2023-20893
JSON object : View
Products Affected
vmware
- vcenter_server
CWE
CWE-416
Use After Free